SlideShare a Scribd company logo
1 of 44
Download to read offline
CNIT 125:
Information Security
Professional
(CISSP
Preparation)
Ch 3. Asset Security
Revised 10-20-17
Topics
ā€¢ Classifying Data
ā€¢ Ownership
ā€¢ Memory and Remanance
ā€¢ Data Destruction
ā€¢ Determining Data Security Controls
Classifying Data
Labels
ā€¢ Governments
ā€¢ Confidential, Secret, Top Secret
ā€¢ Threats to national necurity
ā€¢ SBU (Sensitive But Unclassified)
ā€¢ Sensitive but not a matter of national
security, like employee health records
ā€¢ For Official Use Only (FOUO)
ā€¢ Private Sector
ā€¢ "Internal Use Only", "Company Proprietary"
Security Compartments
ā€¢ Sensitive Compartmented Information
(SCI)
ā€¢ Highly sensitive information
ā€¢ Examples (not testable)
ā€¢ HCS, COMINT (SI), GAMMA (G),
TALENT KEYHOLE (TK)
ā€¢ Compartments require a documented
and approved need to know in additional
to a normal clearance such as top secret
Clearance
ā€¢ Formal determination whether a user can be
trusted with a specific level of information
ā€¢ Considers both current and future
potential trustworthiness
ā€¢ Issues: debt, drug or alcohol abuse,
personal secrets
ā€¢ Most common reasons for denying
clearance
ā€¢ Drug use and foreign influence
Formal Access Approval
ā€¢ Documented approval from the data
owner for a subject to access certain
objects
ā€¢ Requires the subject to understand all
the rules and requirements for accessing
data
ā€¢ And consequences if the data is lost,
destroyed, or compromised
Need to Know
ā€¢ Most systems rely on least privilege
ā€¢ Rely on users to police themselves by
following policy and only attempting to
access information they need to know
Sensitive Information/Media Security
ā€¢ Sensitive Information
ā€¢ Requires protection
ā€¢ Resides on media
ā€¢ Primary storage and backup storage
ā€¢ Policies must cover
ā€¢ Handling
ā€¢ Storage
ā€¢ Retention
Ownership
Business or Mission Owners
ā€¢ Senior management
ā€¢ Create information security program
ā€¢ Ensure that it is properly staffed, funded,
and given organizational priority
ā€¢ Responsible for ensuring that assets are
protected
Data Owners
ā€¢ Also called "information owner"
ā€¢ Management employee responsible for
ensuring that specific data is protected
ā€¢ Determine sensitivity labels and frequency of
backup
ā€¢ Data owner does management
ā€¢ Custodians perform actual hands-on
protection of data
ā€¢ NOTE: this is different from the "Owner" in a
Discretionary Access Control system
System Owner
ā€¢ Manager responsible for the physical
computers that house data
ā€¢ Hardware, software, updates, patches,
etc.
ā€¢ Ensure physical security, patching,
hardening, etc.
ā€¢ Technical hands-on responsibilities are
delegated to Custodians
Custodian
ā€¢ Provides hands-on protection of data
ā€¢ Perform backups, patching configuring
antivirus software, etc.
ā€¢ Custodian follows detailed orders
ā€¢ Does not make critical decisions on
how data is protected
Users
ā€¢ Must comply with policies, procedures,
standards, etc.
ā€¢ Must not write down passwords or
share accounts, for example
ā€¢ Must be made aware of risks,
requirements, and penalties
Data Controller and Data Processors
ā€¢ Data Controllers
ā€¢ Create and manage sensitive data
ā€¢ Human Resources employees are often
data controllers
ā€¢ Data Processors
ā€¢ Manage data on behalf of data
controllers
ā€¢ Ex: outsourced payroll company
Data Collection Limitation
ā€¢ Organizations should collect the
minimum amount of sensitive data that is
required
18
Memory and Remanence
Data Remanence
ā€¢ Data that remains on storage media after
imperfect attempts to erase it
ā€¢ Happens on magnetic media, flash
drives, and SSDs
Memory
ā€¢ None of these retain memory for long
after power is shut off
ā€¢ RAM is main memory
ā€¢ Cache memory
ā€¢ Fast memory on the CPU chip (level 1
cache) or
ā€¢ On other chips (Level 2 cache)
ā€¢ Registers
ā€¢ Part of the CPU
RAM and ROM
ā€¢ RAM is volatile
ā€¢ Data vanishes after power goes off
ā€¢ ROM is not volatile
ā€¢ Cold Boot Attack
ā€¢ Freezing RAM can make the data last
longer without power, up to 30 min. or
so
DRAM and SRAM
ā€¢ Static Random Access Memory (SRAM)
ā€¢ Fast and expensive
ā€¢ Dynamic Random Access Memory
(DRAM)
ā€¢ Slower and cheaper
Firmware
ā€¢ Small programs that rarely change
ā€¢ Ex: BIOS (Basic Input-Output System)
ā€¢ Stored in ROM chips
Types of ROM Chips
ā€¢ PROM (Programmable Read Only Memory) --
write-once
ā€¢ Programmable Logic Device (PLD)
ā€¢ Field-programmable
ā€¢ Types include
ā€¢ EPROM (Erasable Programmable Read
Only Memory)
ā€¢ EEPROM (Electrically Erasable
Programmable Read Only Memory)
ā€¢ Flash Memory
Flash Memory
ā€¢ USB thumb drives
ā€¢ A type of EEPROOM
ā€¢ Written by sectors, not byte-by-byte
ā€¢ Faster than EEPROMs
ā€¢ Slower than magnetic disks
Solid State Drives (SSDs)
ā€¢ Combination of EEPROM and DRAM
ā€¢ SSDs use large block sizes
ā€¢ Blocks are virtual; the computer doesn't
know the physical location of the blocks
ā€¢ Bad blocks are replaced silently by the
SSD controller
ā€¢ Empty blocks are erased by the
controller in a "garbage collection"
process
Cleaning SSDs
ā€¢ Overwriting data from the computer is
ineffective
ā€¢ Cannot access all the blocks
ā€¢ The SSD controller may have an ATA
Erase command
ā€¢ But there's no way to verify its work
ā€¢ It makes no attempt to clean "bad"
blocks
Two Ways to Securely Erase an SSD
ā€¢ Physically destroy the drive
ā€¢ Turn on encryption before the drive is
ever used
ā€¢ That ensures that even the bad blocks
are encrypted
ā€¢ To erase it, delete the key
ā€¢ iPhones work this way
ā€¢ Proven effective in practice
Data Destruction
Overwriting
ā€¢ Deleting a file does not erase its contents
ā€¢ You must write on top of the sectors it
used
ā€¢ Also called shredding or wiping
ā€¢ A single pass is enough for a magnetic
hard drive
Degaussing
ā€¢ Exposing a magnetic disk or tape to high
magnetic field
ā€¢ Can be a secure erase if performed
properly
Destruction
ā€¢ Physically destroy the storage media
ā€¢ More secure than overwriting
ā€¢ Paper shredders destroy printed data
34
Determining Data Security Controls
Certification and Accreditation
ā€¢ Certification
ā€¢ A system meets the requirements of
the data owner
ā€¢ Accreditation
ā€¢ Data owner accepts the certification
Standards and Control Frameworks
ā€¢ PCI-DSS
ā€¢ OCTAVE
ā€¢ Operationally Critical Threat, Asset,
and Vulnerability Evaluation
ā€¢ From Carnegie Mellon U
ā€¢ ISO 27000 Series
ā€¢ Used to be ISO 17799
ā€¢ International standard, very detailed
and expensive to implement
Standards and Control Frameworks
ā€¢ COBIT
ā€¢ Control Objectives for Information and
related Technology
ā€¢ From ISACA (Information Systems Audit
and Control Association)
ā€¢ A governance model
ā€¢ ITIL
ā€¢ Information Technology Infrastructure
Library
ā€¢ Framework for IT service management
Scoping and Tailoring
ā€¢ Scoping
ā€¢ Determining which portions of a standard
an organization will use
ā€¢ If there's no wireless, wireless is "out of
scope"
ā€¢ Tailoring
ā€¢ Customizing a standard for an organization
ā€¢ Controls selection, scoping, and
compensating controls
Protecting Data in Motion
and Data at Rest
Determining Data Security Controls
Drive and Tape Encryption
ā€¢ Protect data at rest, even after physical
security is breached
ā€¢ Recommended for all mobile devices and
mobile media
ā€¢ Whole-disk encryption is recommended
ā€¢ Breach notification laws exclude lost
encrypted data
Media Storage and Transportation
ā€¢ Store backup data offsite
ā€¢ Use a bonded and ensured company for
offsite storage
ā€¢ Secure vehicles and secure site
ā€¢ Don't use informal practices
ā€¢ Like storing backup media at an
employee's house
Protecting Data in Motion
ā€¢ Standards-based end-to-end encryption
ā€¢ Like an IPSec VPN
44

More Related Content

What's hot

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
Ā 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
Ā 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
Ā 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
Ā 
CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)Sam Bowne
Ā 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementSam Bowne
Ā 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
Ā 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
Ā 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecuritySam Bowne
Ā 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
Ā 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingSam Bowne
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
Ā 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
Ā 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
Ā 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity ManagementKarthikeyan Dhayalan
Ā 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
Ā 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
Ā 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
Ā 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
Ā 

What's hot (20)

3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Ā 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Ā 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
Ā 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Ā 
CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125 Ch 4. Security Engineering (Part 1)
Ā 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
Ā 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
Ā 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
Ā 
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset SecurityCISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 3. Asset Security
Ā 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Ā 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
Ā 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Ā 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Ā 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
Ā 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
Ā 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Ā 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Ā 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Ā 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
Ā 

Similar to CNIT 125 Ch 3. Asset Security

Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
Ā 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
Ā 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
Ā 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologySam Bowne
Ā 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
Ā 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
Ā 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
Ā 
Data security
Data securityData security
Data securitysbmiller87
Ā 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
Ā 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptxLydiahkawira1
Ā 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
Ā 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
Ā 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
Ā 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
Ā 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
Ā 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsNicholas Davis
Ā 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsNicholas Davis
Ā 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
Ā 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
Ā 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
Ā 

Similar to CNIT 125 Ch 3. Asset Security (20)

Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
Ā 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
Ā 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
Ā 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
Ā 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Ā 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Ā 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
Ā 
Data security
Data securityData security
Data security
Ā 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
Ā 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptx
Ā 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Ā 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Ā 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Ā 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
Ā 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
Ā 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
Ā 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Ā 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Ā 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
Ā 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Ā 

More from Sam Bowne

Cyberwar
CyberwarCyberwar
CyberwarSam Bowne
Ā 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
Ā 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
Ā 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
Ā 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
Ā 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
Ā 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
Ā 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
Ā 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
Ā 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
Ā 
10 RSA
10 RSA10 RSA
10 RSASam Bowne
Ā 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
Ā 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
Ā 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
Ā 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
Ā 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
Ā 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
Ā 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
Ā 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
Ā 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
Ā 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
Ā 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Ā 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
Ā 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Ā 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Ā 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Ā 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Ā 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Ā 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Ā 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Ā 
10 RSA
10 RSA10 RSA
10 RSA
Ā 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Ā 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
Ā 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Ā 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Ā 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Ā 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Ā 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Ā 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Ā 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Ā 

Recently uploaded

call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
Ā 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
Ā 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
Ā 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A BeƱa
Ā 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
Ā 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
Ā 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
Ā 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A BeƱa
Ā 
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
Ā 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
Ā 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
Ā 
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Nguyen Thanh Tu Collection
Ā 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
Ā 

Recently uploaded (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Ā 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
Ā 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
Ā 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
Ā 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
Ā 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Ā 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
Ā 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
Ā 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
Ā 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Ā 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Ā 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
Ā 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
Ā 
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSĀ® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Ā 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
Ā 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Ā 
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Hį»ŒC Tį»T TIįŗ¾NG ANH 11 THEO CHĘÆĘ NG TRƌNH GLOBAL SUCCESS ĐƁP ƁN CHI TIįŗ¾T - Cįŗ¢ NĂ...
Ā 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Ā 

CNIT 125 Ch 3. Asset Security

  • 2. Topics ā€¢ Classifying Data ā€¢ Ownership ā€¢ Memory and Remanance ā€¢ Data Destruction ā€¢ Determining Data Security Controls
  • 4. Labels ā€¢ Governments ā€¢ Confidential, Secret, Top Secret ā€¢ Threats to national necurity ā€¢ SBU (Sensitive But Unclassified) ā€¢ Sensitive but not a matter of national security, like employee health records ā€¢ For Official Use Only (FOUO) ā€¢ Private Sector ā€¢ "Internal Use Only", "Company Proprietary"
  • 5. Security Compartments ā€¢ Sensitive Compartmented Information (SCI) ā€¢ Highly sensitive information ā€¢ Examples (not testable) ā€¢ HCS, COMINT (SI), GAMMA (G), TALENT KEYHOLE (TK) ā€¢ Compartments require a documented and approved need to know in additional to a normal clearance such as top secret
  • 6. Clearance ā€¢ Formal determination whether a user can be trusted with a specific level of information ā€¢ Considers both current and future potential trustworthiness ā€¢ Issues: debt, drug or alcohol abuse, personal secrets ā€¢ Most common reasons for denying clearance ā€¢ Drug use and foreign influence
  • 7. Formal Access Approval ā€¢ Documented approval from the data owner for a subject to access certain objects ā€¢ Requires the subject to understand all the rules and requirements for accessing data ā€¢ And consequences if the data is lost, destroyed, or compromised
  • 8. Need to Know ā€¢ Most systems rely on least privilege ā€¢ Rely on users to police themselves by following policy and only attempting to access information they need to know
  • 9. Sensitive Information/Media Security ā€¢ Sensitive Information ā€¢ Requires protection ā€¢ Resides on media ā€¢ Primary storage and backup storage ā€¢ Policies must cover ā€¢ Handling ā€¢ Storage ā€¢ Retention
  • 11. Business or Mission Owners ā€¢ Senior management ā€¢ Create information security program ā€¢ Ensure that it is properly staffed, funded, and given organizational priority ā€¢ Responsible for ensuring that assets are protected
  • 12. Data Owners ā€¢ Also called "information owner" ā€¢ Management employee responsible for ensuring that specific data is protected ā€¢ Determine sensitivity labels and frequency of backup ā€¢ Data owner does management ā€¢ Custodians perform actual hands-on protection of data ā€¢ NOTE: this is different from the "Owner" in a Discretionary Access Control system
  • 13. System Owner ā€¢ Manager responsible for the physical computers that house data ā€¢ Hardware, software, updates, patches, etc. ā€¢ Ensure physical security, patching, hardening, etc. ā€¢ Technical hands-on responsibilities are delegated to Custodians
  • 14. Custodian ā€¢ Provides hands-on protection of data ā€¢ Perform backups, patching configuring antivirus software, etc. ā€¢ Custodian follows detailed orders ā€¢ Does not make critical decisions on how data is protected
  • 15. Users ā€¢ Must comply with policies, procedures, standards, etc. ā€¢ Must not write down passwords or share accounts, for example ā€¢ Must be made aware of risks, requirements, and penalties
  • 16. Data Controller and Data Processors ā€¢ Data Controllers ā€¢ Create and manage sensitive data ā€¢ Human Resources employees are often data controllers ā€¢ Data Processors ā€¢ Manage data on behalf of data controllers ā€¢ Ex: outsourced payroll company
  • 17. Data Collection Limitation ā€¢ Organizations should collect the minimum amount of sensitive data that is required
  • 18. 18
  • 20. Data Remanence ā€¢ Data that remains on storage media after imperfect attempts to erase it ā€¢ Happens on magnetic media, flash drives, and SSDs
  • 21. Memory ā€¢ None of these retain memory for long after power is shut off ā€¢ RAM is main memory ā€¢ Cache memory ā€¢ Fast memory on the CPU chip (level 1 cache) or ā€¢ On other chips (Level 2 cache) ā€¢ Registers ā€¢ Part of the CPU
  • 22. RAM and ROM ā€¢ RAM is volatile ā€¢ Data vanishes after power goes off ā€¢ ROM is not volatile ā€¢ Cold Boot Attack ā€¢ Freezing RAM can make the data last longer without power, up to 30 min. or so
  • 23. DRAM and SRAM ā€¢ Static Random Access Memory (SRAM) ā€¢ Fast and expensive ā€¢ Dynamic Random Access Memory (DRAM) ā€¢ Slower and cheaper
  • 24. Firmware ā€¢ Small programs that rarely change ā€¢ Ex: BIOS (Basic Input-Output System) ā€¢ Stored in ROM chips
  • 25. Types of ROM Chips ā€¢ PROM (Programmable Read Only Memory) -- write-once ā€¢ Programmable Logic Device (PLD) ā€¢ Field-programmable ā€¢ Types include ā€¢ EPROM (Erasable Programmable Read Only Memory) ā€¢ EEPROM (Electrically Erasable Programmable Read Only Memory) ā€¢ Flash Memory
  • 26. Flash Memory ā€¢ USB thumb drives ā€¢ A type of EEPROOM ā€¢ Written by sectors, not byte-by-byte ā€¢ Faster than EEPROMs ā€¢ Slower than magnetic disks
  • 27. Solid State Drives (SSDs) ā€¢ Combination of EEPROM and DRAM ā€¢ SSDs use large block sizes ā€¢ Blocks are virtual; the computer doesn't know the physical location of the blocks ā€¢ Bad blocks are replaced silently by the SSD controller ā€¢ Empty blocks are erased by the controller in a "garbage collection" process
  • 28. Cleaning SSDs ā€¢ Overwriting data from the computer is ineffective ā€¢ Cannot access all the blocks ā€¢ The SSD controller may have an ATA Erase command ā€¢ But there's no way to verify its work ā€¢ It makes no attempt to clean "bad" blocks
  • 29. Two Ways to Securely Erase an SSD ā€¢ Physically destroy the drive ā€¢ Turn on encryption before the drive is ever used ā€¢ That ensures that even the bad blocks are encrypted ā€¢ To erase it, delete the key ā€¢ iPhones work this way ā€¢ Proven effective in practice
  • 31. Overwriting ā€¢ Deleting a file does not erase its contents ā€¢ You must write on top of the sectors it used ā€¢ Also called shredding or wiping ā€¢ A single pass is enough for a magnetic hard drive
  • 32. Degaussing ā€¢ Exposing a magnetic disk or tape to high magnetic field ā€¢ Can be a secure erase if performed properly
  • 33. Destruction ā€¢ Physically destroy the storage media ā€¢ More secure than overwriting ā€¢ Paper shredders destroy printed data
  • 34. 34
  • 36. Certification and Accreditation ā€¢ Certification ā€¢ A system meets the requirements of the data owner ā€¢ Accreditation ā€¢ Data owner accepts the certification
  • 37. Standards and Control Frameworks ā€¢ PCI-DSS ā€¢ OCTAVE ā€¢ Operationally Critical Threat, Asset, and Vulnerability Evaluation ā€¢ From Carnegie Mellon U ā€¢ ISO 27000 Series ā€¢ Used to be ISO 17799 ā€¢ International standard, very detailed and expensive to implement
  • 38. Standards and Control Frameworks ā€¢ COBIT ā€¢ Control Objectives for Information and related Technology ā€¢ From ISACA (Information Systems Audit and Control Association) ā€¢ A governance model ā€¢ ITIL ā€¢ Information Technology Infrastructure Library ā€¢ Framework for IT service management
  • 39. Scoping and Tailoring ā€¢ Scoping ā€¢ Determining which portions of a standard an organization will use ā€¢ If there's no wireless, wireless is "out of scope" ā€¢ Tailoring ā€¢ Customizing a standard for an organization ā€¢ Controls selection, scoping, and compensating controls
  • 40. Protecting Data in Motion and Data at Rest Determining Data Security Controls
  • 41. Drive and Tape Encryption ā€¢ Protect data at rest, even after physical security is breached ā€¢ Recommended for all mobile devices and mobile media ā€¢ Whole-disk encryption is recommended ā€¢ Breach notification laws exclude lost encrypted data
  • 42. Media Storage and Transportation ā€¢ Store backup data offsite ā€¢ Use a bonded and ensured company for offsite storage ā€¢ Secure vehicles and secure site ā€¢ Don't use informal practices ā€¢ Like storing backup media at an employee's house
  • 43. Protecting Data in Motion ā€¢ Standards-based end-to-end encryption ā€¢ Like an IPSec VPN
  • 44. 44