SlideShare a Scribd company logo
1 of 44
Download to read offline
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 2. Asset Security
Topics
• Classifying Data
• Ownership
• Memory and Remanance
• Data Destruction
• Determining Data Security Controls
Classifying Data
Labels
• Governments
• Confidential, Secret, Top Secret
• Threats to national necurity
• SBU (Sensitive But Unclassified)
• Sensitive but not a matter of national
security, like employee health records
• For Official Use Only (FOUO)
• Private Sector
• "Internal Use Only", "Company Proprietary"
Security Compartments
• Sensitive Compartmented Information
(SCI)
• Highly sensitive information
• Examples (not testable)
• HCS, COMINT (SI), GAMMA (G),
TALENT KEYHOLE (TK)
• Compartments require a documented
and approved need to know in additional
to a normal clearance such as top secret
Clearance
• Formal determination whether a user can be
trusted with a specific level of information
• Considers both current and future
potential trustworthiness
• Issues: debt, drug or alcohol abuse,
personal secrets
• Most common reasons for denying
clearance
• Drug use and foreign influence
Formal Access Approval
• Documented approval from the data
owner for a subject to access certain
objects
• Requires the subject to understand all
the rules and requirements for accessing
data
• And consequences if the data is lost,
destroyed, or compromised
Need to Know
• Most systems rely on least privilege
• Rely on users to police themselves by
following policy and only attempting to
access information they need to know
Sensitive Information/Media Security
• Sensitive Information
• Requires protection
• Resides on media
• Primary storage and backup storage
• Policies must cover
• Handling
• Storage
• Retention
Ownership
Business or Mission Owners
• Senior management
• Create information security program
• Ensure that it is properly staffed, funded,
and given organizational priority
• Responsible for ensuring that assets are
protected
Data Owners
• Also called "information owner"
• Management employee responsible for
ensuring that specific data is protected
• Determine sensitivity labels and frequency of
backup
• Data owner does management
• Custodians perform actual hands-on
protection of data
• NOTE: this is different from the "Owner" in a
Discretionary Access Control system
System Owner
• Manager responsible for the physical
computers that house data
• Hardware, software, updates, patches,
etc.
• Ensure physical security, patching,
hardening, etc.
• Technical hands-on responsibilities are
delegated to Custodians
Custodian
• Provides hands-on protection of data
• Perform backups, patching configuring
antivirus software, etc.
• Custodian follows detailed orders
• Does not make critical decisions on
how data is protected
Users
• Must comply with policies, procedures,
standards, etc.
• Must not write down passwords or
share accounts, for example
• Must be made aware of risks,
requirements, and penalties
Data Controller and Data Processors
• Data Controllers
• Create and manage sensitive data
• Human Resources employees are often
data controllers
• Data Processors
• Manage data on behalf of data
controllers
• Ex: outsourced payroll company
Data Collection Limitation
• Organizations should collect the
minimum amount of sensitive data that is
required
18
Memory and Remanence
Data Remanence
• Data that remains on storage media after
imperfect attempts to erase it
• Happens on magnetic media, flash
drives, and SSDs
Memory
• None of these retain memory for long
after power is shut off
• RAM is main memory
• Cache memory
• Fast memory on the CPU chip (level 1
cache) or
• On other chips (Level 2 cache)
• Registers
• Part of the CPU
RAM and ROM
• RAM is volatile
• Data vanishes after power goes off
• ROM is not volatile
• Cold Boot Attack
• Freezing RAM can make the data last
longer without power, up to 30 min. or
so
DRAM and SRAM
• Static Random Access Memory (SRAM)
• Fast and expensive
• Dynamic Random Access Memory
(DRAM)
• Slower and cheaper
Firmware
• Small programs that rarely change
• Ex: BIOS (Basic Input-Output System)
• Stored in ROM chips
Types of ROM Chips
• PROM (Programmable Read Only Memory) --
write-once
• Programmable Logic Device (PLD)
• Field-programmable
• Types include
• EPROM (Erasable Programmable Read
Only Memory)
• EEPROM (Electrically Erasable
Programmable Read Only Memory)
• Flash Memory
Flash Memory
• USB thumb drives
• A type of EEPROM
• Written by sectors, not byte-by-byte
• Faster than EEPROMs
• Slower than magnetic disks
Solid State Drives (SSDs)
• Combination of EEPROM and DRAM
• SSDs use large block sizes
• Blocks are virtual; the computer doesn't
know the physical location of the blocks
• Bad blocks are replaced silently by the
SSD controller
• Empty blocks are erased by the
controller in a "garbage collection"
process
Cleaning SSDs
• Overwriting data from the computer is
ineffective
• Cannot access all the blocks
• The SSD controller may have an ATA
Erase command
• But there's no way to verify its work
• It makes no attempt to clean "bad"
blocks
Two Ways to Securely Erase an SSD
• Physically destroy the drive
• Turn on encryption before the drive is
ever used
• That ensures that even the bad blocks
are encrypted
• To erase it, delete the key
• iPhones work this way
• Proven effective in practice
Data Destruction
Overwriting
• Deleting a file does not erase its contents
• You must write on top of the sectors it
used
• Also called shredding or wiping
• A single pass is enough for a magnetic
hard drive
Degaussing
• Exposing a magnetic disk or tape to high
magnetic field
• Can be a secure erase if performed
properly
Destruction
• Physically destroy the storage media
• More secure than overwriting
• Paper shredders destroy printed data
•
34
Determining Data Security Controls
Certification and Accreditation
• Certification
• A system meets the requirements of
the data owner
• Accreditation
• Data owner accepts the certification
Standards and Control Frameworks
• PCI-DSS
• OCTAVE
• Operationally Critical Threat, Asset,
and Vulnerability Evaluation
• From Carnegie Mellon U
• ISO 27000 Series
• Used to be ISO 17799
• International standard, very detailed
and expensive to implement
Standards and Control Frameworks
• COBIT
• Control Objectives for Information and
related Technology
• From ISACA (Information Systems Audit
and Control Association)
• A governance model
• ITIL
• Information Technology Infrastructure
Library
• Framework for IT service management
Scoping and Tailoring
• Scoping
• Determining which portions of a standard
an organization will use
• If there's no wireless, wireless is "out of
scope"
• Tailoring
• Customizing a standard for an organization
• Controls selection, scoping, and
compensating controls
Protecting Data in Motion
and Data at Rest
Determining Data Security Controls
Drive and Tape Encryption
• Protect data at rest, even after physical
security is breached
• Recommended for all mobile devices and
mobile media
• Whole-disk encryption is recommended
• Breach notification laws exclude lost
encrypted data
Media Storage and Transportation
• Store backup data offsite
• Use a bonded and ensured company for
offsite storage
• Secure vehicles and secure site
• Don't use informal practices
• Like storing backup media at an
employee's house
Protecting Data in Motion
• Standards-based end-to-end encryption
• Like an IPSec VPN
44

More Related Content

What's hot

CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)Sam Bowne
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecuritySam Bowne
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity ManagementKarthikeyan Dhayalan
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)Sam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)Sam Bowne
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)Sam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsSam Bowne
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentSam Bowne
 

What's hot (20)

CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 

Similar to 2. Asset Security

CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologySam Bowne
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
Data security
Data securityData security
Data securitysbmiller87
 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptxLydiahkawira1
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 

Similar to 2. Asset Security (20)

CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
Data security
Data securityData security
Data security
 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptx
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 

More from Sam Bowne

Cyberwar
CyberwarCyberwar
CyberwarSam Bowne
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
10 RSA
10 RSA10 RSA
10 RSASam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

2. Asset Security

  • 2. Topics • Classifying Data • Ownership • Memory and Remanance • Data Destruction • Determining Data Security Controls
  • 4. Labels • Governments • Confidential, Secret, Top Secret • Threats to national necurity • SBU (Sensitive But Unclassified) • Sensitive but not a matter of national security, like employee health records • For Official Use Only (FOUO) • Private Sector • "Internal Use Only", "Company Proprietary"
  • 5. Security Compartments • Sensitive Compartmented Information (SCI) • Highly sensitive information • Examples (not testable) • HCS, COMINT (SI), GAMMA (G), TALENT KEYHOLE (TK) • Compartments require a documented and approved need to know in additional to a normal clearance such as top secret
  • 6. Clearance • Formal determination whether a user can be trusted with a specific level of information • Considers both current and future potential trustworthiness • Issues: debt, drug or alcohol abuse, personal secrets • Most common reasons for denying clearance • Drug use and foreign influence
  • 7. Formal Access Approval • Documented approval from the data owner for a subject to access certain objects • Requires the subject to understand all the rules and requirements for accessing data • And consequences if the data is lost, destroyed, or compromised
  • 8. Need to Know • Most systems rely on least privilege • Rely on users to police themselves by following policy and only attempting to access information they need to know
  • 9. Sensitive Information/Media Security • Sensitive Information • Requires protection • Resides on media • Primary storage and backup storage • Policies must cover • Handling • Storage • Retention
  • 11. Business or Mission Owners • Senior management • Create information security program • Ensure that it is properly staffed, funded, and given organizational priority • Responsible for ensuring that assets are protected
  • 12. Data Owners • Also called "information owner" • Management employee responsible for ensuring that specific data is protected • Determine sensitivity labels and frequency of backup • Data owner does management • Custodians perform actual hands-on protection of data • NOTE: this is different from the "Owner" in a Discretionary Access Control system
  • 13. System Owner • Manager responsible for the physical computers that house data • Hardware, software, updates, patches, etc. • Ensure physical security, patching, hardening, etc. • Technical hands-on responsibilities are delegated to Custodians
  • 14. Custodian • Provides hands-on protection of data • Perform backups, patching configuring antivirus software, etc. • Custodian follows detailed orders • Does not make critical decisions on how data is protected
  • 15. Users • Must comply with policies, procedures, standards, etc. • Must not write down passwords or share accounts, for example • Must be made aware of risks, requirements, and penalties
  • 16. Data Controller and Data Processors • Data Controllers • Create and manage sensitive data • Human Resources employees are often data controllers • Data Processors • Manage data on behalf of data controllers • Ex: outsourced payroll company
  • 17. Data Collection Limitation • Organizations should collect the minimum amount of sensitive data that is required
  • 18. 18
  • 20. Data Remanence • Data that remains on storage media after imperfect attempts to erase it • Happens on magnetic media, flash drives, and SSDs
  • 21. Memory • None of these retain memory for long after power is shut off • RAM is main memory • Cache memory • Fast memory on the CPU chip (level 1 cache) or • On other chips (Level 2 cache) • Registers • Part of the CPU
  • 22. RAM and ROM • RAM is volatile • Data vanishes after power goes off • ROM is not volatile • Cold Boot Attack • Freezing RAM can make the data last longer without power, up to 30 min. or so
  • 23. DRAM and SRAM • Static Random Access Memory (SRAM) • Fast and expensive • Dynamic Random Access Memory (DRAM) • Slower and cheaper
  • 24. Firmware • Small programs that rarely change • Ex: BIOS (Basic Input-Output System) • Stored in ROM chips
  • 25. Types of ROM Chips • PROM (Programmable Read Only Memory) -- write-once • Programmable Logic Device (PLD) • Field-programmable • Types include • EPROM (Erasable Programmable Read Only Memory) • EEPROM (Electrically Erasable Programmable Read Only Memory) • Flash Memory
  • 26. Flash Memory • USB thumb drives • A type of EEPROM • Written by sectors, not byte-by-byte • Faster than EEPROMs • Slower than magnetic disks
  • 27. Solid State Drives (SSDs) • Combination of EEPROM and DRAM • SSDs use large block sizes • Blocks are virtual; the computer doesn't know the physical location of the blocks • Bad blocks are replaced silently by the SSD controller • Empty blocks are erased by the controller in a "garbage collection" process
  • 28. Cleaning SSDs • Overwriting data from the computer is ineffective • Cannot access all the blocks • The SSD controller may have an ATA Erase command • But there's no way to verify its work • It makes no attempt to clean "bad" blocks
  • 29. Two Ways to Securely Erase an SSD • Physically destroy the drive • Turn on encryption before the drive is ever used • That ensures that even the bad blocks are encrypted • To erase it, delete the key • iPhones work this way • Proven effective in practice
  • 31. Overwriting • Deleting a file does not erase its contents • You must write on top of the sectors it used • Also called shredding or wiping • A single pass is enough for a magnetic hard drive
  • 32. Degaussing • Exposing a magnetic disk or tape to high magnetic field • Can be a secure erase if performed properly
  • 33. Destruction • Physically destroy the storage media • More secure than overwriting • Paper shredders destroy printed data •
  • 34. 34
  • 36. Certification and Accreditation • Certification • A system meets the requirements of the data owner • Accreditation • Data owner accepts the certification
  • 37. Standards and Control Frameworks • PCI-DSS • OCTAVE • Operationally Critical Threat, Asset, and Vulnerability Evaluation • From Carnegie Mellon U • ISO 27000 Series • Used to be ISO 17799 • International standard, very detailed and expensive to implement
  • 38. Standards and Control Frameworks • COBIT • Control Objectives for Information and related Technology • From ISACA (Information Systems Audit and Control Association) • A governance model • ITIL • Information Technology Infrastructure Library • Framework for IT service management
  • 39. Scoping and Tailoring • Scoping • Determining which portions of a standard an organization will use • If there's no wireless, wireless is "out of scope" • Tailoring • Customizing a standard for an organization • Controls selection, scoping, and compensating controls
  • 40. Protecting Data in Motion and Data at Rest Determining Data Security Controls
  • 41. Drive and Tape Encryption • Protect data at rest, even after physical security is breached • Recommended for all mobile devices and mobile media • Whole-disk encryption is recommended • Breach notification laws exclude lost encrypted data
  • 42. Media Storage and Transportation • Store backup data offsite • Use a bonded and ensured company for offsite storage • Secure vehicles and secure site • Don't use informal practices • Like storing backup media at an employee's house
  • 43. Protecting Data in Motion • Standards-based end-to-end encryption • Like an IPSec VPN
  • 44. 44