Creating a Security Verified Label Standard Patricia Joseph Joseph Consulting LLC.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Recommendations on the future of online GyroScope & Databse implementation.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Internet, Intranet and Extranets
An Introduction to Information Systems in Organizations
FIT3105 Smart card based authentication and identity management Lecture 4.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. COMPSCI 125 Introduction to Computer Science I.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
SEC835 Database and Web application security Information Security Architecture.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Entré NetMonitor Proactive IT monitoring, Management and support Think DIFFERENT about IT.
Fundamentals of Information Systems, Second Edition 1 Information Systems in Organizations.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
IBM Start Now Business Intelligence Solutions. Agenda Overview of BI Who will buy and why Start Now BI solution Benefit to customer.
Role of GIS in food and nutrition surveillance SESSION 15 University of Nairobi June, 2004.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Security Planning and Administrative Delegation Lesson 6.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
COMP 6005 An Introduction To Computing Session Three: Computer Software Introduction.
Welcome To Business Summary DiveIn Incorporated is a small company that specializes in the sales of swimming pools supplies to homeowners by mail order.
Informatics 43 – May 26, The Design Phase of Software Development Something usually needs to be done after the user’s requirements are specified.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
Server Virtualization
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Government Wide Contracts and IT Standards OpenGroup ‘04 Joanne Woytek NASA GSFC
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
INFORMATION SECURITY AWARENESS Whose Job is it Anyway? Ron Freedman Ron Freedman Vice President VCampus Corporation Scott Wright Scott WrightPresident.
Introduction TO Network Administration
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
BIS 220 MASTER Leading through innovation/bis220masterdotcom.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Kara O’Bannon Spalding University September 2015 Training Consultant.
Internet, Intranet and Extranets
Data and database administration
Internet, Intranet and Extranets
records Database Vocabulary It can be useful to collect information.
Government Wide Contracts and IT Standards OpenGroup ‘04
Introduction to Networking
Firewalls.
IBM Start Now Host Integration Solutions
Designing a local area network
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Today’s Risk. Today’s Solutions. Cyber security and
Internet, Intranet and Extranets
COMPTIA CAS-003 Dumps VCE
OPERATING SYSTEMS.
Lesson 1: Introduction to HIPAA
Communicating in the IT Industry
Information Technology and E-Commerce
Introduction to Networking Security
Supports launch of cloud-based endpoint management service
Presentation transcript:

Creating a Security Verified Label Standard Patricia Joseph Joseph Consulting LLC

Agenda  Introduction  The Threat is Real & increased trends in security breaches  What is the security problem, if 80% of breaches are preventable?  Need for security and the need for security Labels  Putting it all together; The security verified standard Labels  Conclusion  Questions

Introduction  A standard of measurement is needed in the industry to allow consumers the ability to determine quickly if the software and hardware functionality they wish to implement has the ability to be secure within their network.

The Threat is Real  Increase in security Breaches:  The number of data breaches up 21% in 2006 and Quadrupled in 2007  In % increase over 2007  In the past five years, approximately 500 million records containing personal identifying information of United States residents stored in government and corporate databases was either lost or stolen.  80% of people have had their information stolen in the past five years at least once.

What are the gypsies after?  Everything  Credit card information  Health information  Marketing information  Personal Information  Your entire computer; CPU, Hardrive  Just about anything they can steel, aka The Gypsy Hacker

80% security Breaches preventable  In the case of a large discount store, mentioned in my abstract, wireless access was left completely open and unsecured.  In the case of a major health care industry, down for a month because of an XXS hacker message.  Major health association allowed major queries to the database exposing confidential information to the public  Simple fixes, Detrimental Impacts

Why are there a high number of breaches if 80% are preventable  How could we have a breach? We have a firewall  Main focus is on Functionality  Cost of Security Education of Security Chief Technical officer  Ignorance of the organization Individuals in the organization may not be educated in security or aware of security patches and fixes

Need for Security  Do we need Security and security standards?  Of course

Known Security Standards  Example of Standards:  Application Wasp  Sox/PCI  2700, NIST  IEEE  How do we put all of these standards together?

Standards Working Together Security Verified Label Standard implemented as both a 1. Software Standard 2. Organizational standard

All Working together: Security Verified Label standards  Using the OSI model as our basis of organization, we can distinguish and set standards for each layer Application layer Presentation layer Session layer Transport layer Net w ork layer Data link layer Physical layer Application layer standards Presentation layer standards Session layer standards Transport layer standards Network Layer Standards Data link layer standards Physical layer standard

Security Verified Label Standard 1. Software companies comply with set standards of how to make their software secure  Examples: Web software: SSL Capable + instructional documentation AIX containing documentation to harden OS

Security Verified Label Standard 1. Consumer has a simplified way of telling if software company has considered security through reading the package or product description.  Example: Unix Software Physical Level Secure capable Datalink Level Secure capable Network level Secure capable Web Software Application Level secure capable Session Level secure capable

Security Verified Label Standards: Benefits  Faster and easier way to tell through labels if the software you are buying has security capabilities.  Easy way to tell security for non-technical and non-security educated  Cheaper for organizations to implement this security standard  Easier for organizations to implement security through instructions given with software. If the software claims it fits this standard it must come with implementation instructions  Responsibility lies on each part of the organization

Working Together: IT Organization  Each part of the organization is responsible for their own piece of security Database Administrator MiddleWare Administrator Network Administrator Unix or Windows Admin Application Developer

Conclusion: Creating an Overall Standard  Security decisions need to be made easier, more cheaply for consumers  Using the OSI Model as our level by which to measure a level of security, a label can be given to the software stating at what level it has the potential to be secure.  This security verification standard would outline how the software and hardware would be considered secure. Each level according to the OSI model would contain it’s own set of standards. Once the software/ hardware passes the verification a label can appear next to the software. This will make decisions easier for consumers and essentially easier for upper management to understand.

Acknowledgements  preventable preventable  rocket rocket   _Data_Breach_Totals_Soar.shtml