SlideShare a Scribd company logo
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 2. Asset Security
Topics
• Classifying Data
• Ownership
• Memory and Remanance
• Data Destruction
• Determining Data Security Controls
Classifying Data
Labels
• Governments
• Confidential, Secret, Top Secret
• Threats to national necurity
• SBU (Sensitive But Unclassified)
• Sensitive but not a matter of national
security, like employee health records
• For Official Use Only (FOUO)
• Private Sector
• "Internal Use Only", "Company Proprietary"
Security Compartments
• Sensitive Compartmented Information
(SCI)
• Highly sensitive information
• Examples (not testable)
• HCS, COMINT (SI), GAMMA (G),
TALENT KEYHOLE (TK)
• Compartments require a documented
and approved need to know in additional
to a normal clearance such as top secret
Clearance
• Formal determination whether a user can be
trusted with a specific level of information
• Considers both current and future
potential trustworthiness
• Issues: debt, drug or alcohol abuse,
personal secrets
• Most common reasons for denying
clearance
• Drug use and foreign influence
Formal Access Approval
• Documented approval from the data
owner for a subject to access certain
objects
• Requires the subject to understand all
the rules and requirements for accessing
data
• And consequences if the data is lost,
destroyed, or compromised
Need to Know
• Most systems rely on least privilege
• Rely on users to police themselves by
following policy and only attempting to
access information they need to know
Sensitive Information/Media Security
• Sensitive Information
• Requires protection
• Resides on media
• Primary storage and backup storage
• Policies must cover
• Handling
• Storage
• Retention
Ownership
Business or Mission Owners
• Senior management
• Create information security program
• Ensure that it is properly staffed, funded,
and given organizational priority
• Responsible for ensuring that assets are
protected
Data Owners
• Also called "information owner"
• Management employee responsible for
ensuring that specific data is protected
• Determine sensitivity labels and frequency of
backup
• Data owner does management
• Custodians perform actual hands-on
protection of data
• NOTE: this is different from the "Owner" in a
Discretionary Access Control system
System Owner
• Manager responsible for the physical
computers that house data
• Hardware, software, updates, patches,
etc.
• Ensure physical security, patching,
hardening, etc.
• Technical hands-on responsibilities are
delegated to Custodians
Custodian
• Provides hands-on protection of data
• Perform backups, patching configuring
antivirus software, etc.
• Custodian follows detailed orders
• Does not make critical decisions on
how data is protected
Users
• Must comply with policies, procedures,
standards, etc.
• Must not write down passwords or
share accounts, for example
• Must be made aware of risks,
requirements, and penalties
Data Controller and Data Processors
• Data Controllers
• Create and manage sensitive data
• Human Resources employees are often
data controllers
• Data Processors
• Manage data on behalf of data
controllers
• Ex: outsourced payroll company
Data Collection Limitation
• Organizations should collect the
minimum amount of sensitive data that is
required
18
Memory and Remanence
Data Remanence
• Data that remains on storage media after
imperfect attempts to erase it
• Happens on magnetic media, flash
drives, and SSDs
Memory
• None of these retain memory for long
after power is shut off
• RAM is main memory
• Cache memory
• Fast memory on the CPU chip (level 1
cache) or
• On other chips (Level 2 cache)
• Registers
• Part of the CPU
RAM and ROM
• RAM is volatile
• Data vanishes after power goes off
• ROM is not volatile
• Cold Boot Attack
• Freezing RAM can make the data last
longer without power, up to 30 min. or
so
DRAM and SRAM
• Static Random Access Memory (SRAM)
• Fast and expensive
• Dynamic Random Access Memory
(DRAM)
• Slower and cheaper
Firmware
• Small programs that rarely change
• Ex: BIOS (Basic Input-Output System)
• Stored in ROM chips
Types of ROM Chips
• PROM (Programmable Read Only Memory) --
write-once
• Programmable Logic Device (PLD)
• Field-programmable
• Types include
• EPROM (Erasable Programmable Read
Only Memory)
• EEPROM (Electrically Erasable
Programmable Read Only Memory)
• Flash Memory
Flash Memory
• USB thumb drives
• A type of EEPROM
• Written by sectors, not byte-by-byte
• Faster than EEPROMs
• Slower than magnetic disks
Solid State Drives (SSDs)
• Combination of EEPROM and DRAM
• SSDs use large block sizes
• Blocks are virtual; the computer doesn't
know the physical location of the blocks
• Bad blocks are replaced silently by the
SSD controller
• Empty blocks are erased by the
controller in a "garbage collection"
process
Cleaning SSDs
• Overwriting data from the computer is
ineffective
• Cannot access all the blocks
• The SSD controller may have an ATA
Erase command
• But there's no way to verify its work
• It makes no attempt to clean "bad"
blocks
Two Ways to Securely Erase an SSD
• Physically destroy the drive
• Turn on encryption before the drive is
ever used
• That ensures that even the bad blocks
are encrypted
• To erase it, delete the key
• iPhones work this way
• Proven effective in practice
Data Destruction
Overwriting
• Deleting a file does not erase its contents
• You must write on top of the sectors it
used
• Also called shredding or wiping
• A single pass is enough for a magnetic
hard drive
Degaussing
• Exposing a magnetic disk or tape to high
magnetic field
• Can be a secure erase if performed
properly
Destruction
• Physically destroy the storage media
• More secure than overwriting
• Paper shredders destroy printed data
•
34
Determining Data Security Controls
Certification and Accreditation
• Certification
• A system meets the requirements of
the data owner
• Accreditation
• Data owner accepts the certification
Standards and Control Frameworks
• PCI-DSS
• OCTAVE
• Operationally Critical Threat, Asset,
and Vulnerability Evaluation
• From Carnegie Mellon U
• ISO 27000 Series
• Used to be ISO 17799
• International standard, very detailed
and expensive to implement
Standards and Control Frameworks
• COBIT
• Control Objectives for Information and
related Technology
• From ISACA (Information Systems Audit
and Control Association)
• A governance model
• ITIL
• Information Technology Infrastructure
Library
• Framework for IT service management
Scoping and Tailoring
• Scoping
• Determining which portions of a standard
an organization will use
• If there's no wireless, wireless is "out of
scope"
• Tailoring
• Customizing a standard for an organization
• Controls selection, scoping, and
compensating controls
Protecting Data in Motion
and Data at Rest
Determining Data Security Controls
Drive and Tape Encryption
• Protect data at rest, even after physical
security is breached
• Recommended for all mobile devices and
mobile media
• Whole-disk encryption is recommended
• Breach notification laws exclude lost
encrypted data
Media Storage and Transportation
• Store backup data offsite
• Use a bonded and ensured company for
offsite storage
• Secure vehicles and secure site
• Don't use informal practices
• Like storing backup media at an
employee's house
Protecting Data in Motion
• Standards-based end-to-end encryption
• Like an IPSec VPN
44

More Related Content

What's hot

CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
Sam Bowne
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
Sam Bowne
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
Karthikeyan Dhayalan
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
Karthikeyan Dhayalan
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
Sam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
Sam Bowne
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
Karthikeyan Dhayalan
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
Sam Bowne
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
Sam Bowne
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
Sam Bowne
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
Sam Bowne
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
Sam Bowne
 

What's hot (20)

CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
 
Chapter 1 Law & Ethics
Chapter 1   Law & EthicsChapter 1   Law & Ethics
Chapter 1 Law & Ethics
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Ch 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 

Similar to 2. Asset Security

CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
Sam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Sam Bowne
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ben Rothke
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
Precisely
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
newbie2019
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Resilient Systems
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
Sam Bowne
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
Data security
Data securityData security
Data security
sbmiller87
 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptx
Lydiahkawira1
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
Kimberly Simon MBA
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 

Similar to 2. Asset Security (20)

CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
Data security
Data securityData security
Data security
 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptx
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 

More from Sam Bowne

Cyberwar
CyberwarCyberwar
Cyberwar
Sam Bowne
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne
 
10 RSA
10 RSA10 RSA
10 RSA
Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

2. Asset Security

  • 2. Topics • Classifying Data • Ownership • Memory and Remanance • Data Destruction • Determining Data Security Controls
  • 4. Labels • Governments • Confidential, Secret, Top Secret • Threats to national necurity • SBU (Sensitive But Unclassified) • Sensitive but not a matter of national security, like employee health records • For Official Use Only (FOUO) • Private Sector • "Internal Use Only", "Company Proprietary"
  • 5. Security Compartments • Sensitive Compartmented Information (SCI) • Highly sensitive information • Examples (not testable) • HCS, COMINT (SI), GAMMA (G), TALENT KEYHOLE (TK) • Compartments require a documented and approved need to know in additional to a normal clearance such as top secret
  • 6. Clearance • Formal determination whether a user can be trusted with a specific level of information • Considers both current and future potential trustworthiness • Issues: debt, drug or alcohol abuse, personal secrets • Most common reasons for denying clearance • Drug use and foreign influence
  • 7. Formal Access Approval • Documented approval from the data owner for a subject to access certain objects • Requires the subject to understand all the rules and requirements for accessing data • And consequences if the data is lost, destroyed, or compromised
  • 8. Need to Know • Most systems rely on least privilege • Rely on users to police themselves by following policy and only attempting to access information they need to know
  • 9. Sensitive Information/Media Security • Sensitive Information • Requires protection • Resides on media • Primary storage and backup storage • Policies must cover • Handling • Storage • Retention
  • 11. Business or Mission Owners • Senior management • Create information security program • Ensure that it is properly staffed, funded, and given organizational priority • Responsible for ensuring that assets are protected
  • 12. Data Owners • Also called "information owner" • Management employee responsible for ensuring that specific data is protected • Determine sensitivity labels and frequency of backup • Data owner does management • Custodians perform actual hands-on protection of data • NOTE: this is different from the "Owner" in a Discretionary Access Control system
  • 13. System Owner • Manager responsible for the physical computers that house data • Hardware, software, updates, patches, etc. • Ensure physical security, patching, hardening, etc. • Technical hands-on responsibilities are delegated to Custodians
  • 14. Custodian • Provides hands-on protection of data • Perform backups, patching configuring antivirus software, etc. • Custodian follows detailed orders • Does not make critical decisions on how data is protected
  • 15. Users • Must comply with policies, procedures, standards, etc. • Must not write down passwords or share accounts, for example • Must be made aware of risks, requirements, and penalties
  • 16. Data Controller and Data Processors • Data Controllers • Create and manage sensitive data • Human Resources employees are often data controllers • Data Processors • Manage data on behalf of data controllers • Ex: outsourced payroll company
  • 17. Data Collection Limitation • Organizations should collect the minimum amount of sensitive data that is required
  • 18. 18
  • 20. Data Remanence • Data that remains on storage media after imperfect attempts to erase it • Happens on magnetic media, flash drives, and SSDs
  • 21. Memory • None of these retain memory for long after power is shut off • RAM is main memory • Cache memory • Fast memory on the CPU chip (level 1 cache) or • On other chips (Level 2 cache) • Registers • Part of the CPU
  • 22. RAM and ROM • RAM is volatile • Data vanishes after power goes off • ROM is not volatile • Cold Boot Attack • Freezing RAM can make the data last longer without power, up to 30 min. or so
  • 23. DRAM and SRAM • Static Random Access Memory (SRAM) • Fast and expensive • Dynamic Random Access Memory (DRAM) • Slower and cheaper
  • 24. Firmware • Small programs that rarely change • Ex: BIOS (Basic Input-Output System) • Stored in ROM chips
  • 25. Types of ROM Chips • PROM (Programmable Read Only Memory) -- write-once • Programmable Logic Device (PLD) • Field-programmable • Types include • EPROM (Erasable Programmable Read Only Memory) • EEPROM (Electrically Erasable Programmable Read Only Memory) • Flash Memory
  • 26. Flash Memory • USB thumb drives • A type of EEPROM • Written by sectors, not byte-by-byte • Faster than EEPROMs • Slower than magnetic disks
  • 27. Solid State Drives (SSDs) • Combination of EEPROM and DRAM • SSDs use large block sizes • Blocks are virtual; the computer doesn't know the physical location of the blocks • Bad blocks are replaced silently by the SSD controller • Empty blocks are erased by the controller in a "garbage collection" process
  • 28. Cleaning SSDs • Overwriting data from the computer is ineffective • Cannot access all the blocks • The SSD controller may have an ATA Erase command • But there's no way to verify its work • It makes no attempt to clean "bad" blocks
  • 29. Two Ways to Securely Erase an SSD • Physically destroy the drive • Turn on encryption before the drive is ever used • That ensures that even the bad blocks are encrypted • To erase it, delete the key • iPhones work this way • Proven effective in practice
  • 31. Overwriting • Deleting a file does not erase its contents • You must write on top of the sectors it used • Also called shredding or wiping • A single pass is enough for a magnetic hard drive
  • 32. Degaussing • Exposing a magnetic disk or tape to high magnetic field • Can be a secure erase if performed properly
  • 33. Destruction • Physically destroy the storage media • More secure than overwriting • Paper shredders destroy printed data •
  • 34. 34
  • 36. Certification and Accreditation • Certification • A system meets the requirements of the data owner • Accreditation • Data owner accepts the certification
  • 37. Standards and Control Frameworks • PCI-DSS • OCTAVE • Operationally Critical Threat, Asset, and Vulnerability Evaluation • From Carnegie Mellon U • ISO 27000 Series • Used to be ISO 17799 • International standard, very detailed and expensive to implement
  • 38. Standards and Control Frameworks • COBIT • Control Objectives for Information and related Technology • From ISACA (Information Systems Audit and Control Association) • A governance model • ITIL • Information Technology Infrastructure Library • Framework for IT service management
  • 39. Scoping and Tailoring • Scoping • Determining which portions of a standard an organization will use • If there's no wireless, wireless is "out of scope" • Tailoring • Customizing a standard for an organization • Controls selection, scoping, and compensating controls
  • 40. Protecting Data in Motion and Data at Rest Determining Data Security Controls
  • 41. Drive and Tape Encryption • Protect data at rest, even after physical security is breached • Recommended for all mobile devices and mobile media • Whole-disk encryption is recommended • Breach notification laws exclude lost encrypted data
  • 42. Media Storage and Transportation • Store backup data offsite • Use a bonded and ensured company for offsite storage • Secure vehicles and secure site • Don't use informal practices • Like storing backup media at an employee's house
  • 43. Protecting Data in Motion • Standards-based end-to-end encryption • Like an IPSec VPN
  • 44. 44