Information Security has Failed What Next? Professor Richard Walton CB Royal Holloway 6 September 2014.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

The Threat Landscape Jan Threat Report 2.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Information Security Awareness Training
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
Fair competition commission Mobile and Cyber Threat Issues Joshua Msoma Tanzania Fair Competition Commission Sixth Annual African Dialogue Conference Lilongwe,
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
SC2 meeting 24 November 2014 Security Measures and Resources Toolbox
All rights reserved © 2005, Alcatel Enhanced Security situational Awareness for (Enterprise) networks  Bertrand Marquet / François Cosquer  Alcatel.
FIGHT AGAINST CORRUPTION: THE LITHUANIAN WAY. CONTENTS Factors Decision Challenges Dilemmas Priorities.
Welcome to New Hire Orientation Information Security
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
SEC835 Database and Web application security Information Security Architecture.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
© RHEINMETALL DEFENCE 2014 Systems Engineering at Rheinmetall Air Defence Dr. Marc Honikel.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
CSCE 548 Secure Software Development Security Operations.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Legal and Ethical Issues in Computer Security Csilla Farkas
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
MTRS3 Solutions and Services (SME, IL). MTRS in a nutshell  A security consulting company specialising in high risk environments (SME)  Main fields.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Managing Trust Professor Richard Walton CB. Exam Question The importance of Trust in Data Protection (This essay should discuss the relationship between.
Information Security and Privacy By: Joshua Waibel.
Which is better Avast Free Edition or Avast Pro Version?
Cybersecurity - What’s Next? June 2017
Design for Security Pepper.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Information Technology Controls
Compliance with hardening standards
Lecture 8. Cyber Security, Ethics and Trust
eScan Antivirus Technical Support Toll Free Number
Securing the Law Firm Myth vs. Reality vs. Practicality:
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
A Data Focussed Approach to Mapping Security Issues to Safety Impacts Dr Robert Oates Private – Rolls-Royce Proprietary Information.
Cyber Security in New Jersey State Government
Chapter 1: Introduction
Csilla Farkas Cybersecurity Csilla Farkas
Chapter 27 Security Engineering
How to Mitigate the Consequences What are the Countermeasures?
We secure the communication
Improving Data Security & Protection Using Data Provenance Figure 1
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Information Security has Failed What Next? Professor Richard Walton CB Royal Holloway 6 September 2014

Infosec has failed Infosec defined in mid-1980s  Generalisation of Comsec  Crypto Technology of 1970's – solved the major technical Comsec challenge  Infosec should have followed with technical solutions to: – Availability – Confidentiality – Integrity

Infosec has failed Today  Technical Cyber attacks abound  Software quality is abysmal  Criminals download commoditised malware  Mobile devices exacerbate the problems  Security is permanently reactive  We can't PREVENT successful attacks

Information Security Today and Tomorrow Today  Business Dependency  Criminal Threat  Some Control of assets  Poor 'professional' software Tomorrow Personal Dependency Increased Threat Ubiquitous uncontrolled assets Amateur software

Response - More of the Same (only better this time)  Awareness - must keep banging on  Law – must improve – must enforce  Better Authentication  Better Risk Management

Software Quality Bespoke still required at the High end - But will be resisted Must accept that most Apps will be written by incompetent progammers Vital to harden the building blocks

Software Quality  Software Libraries require a total rewrite  Documentation must be improved – and simplified – to cater for the dummed down programming  Education of the elite must be upgunned  Education of the masses also needs attention  Strengthen acceptance criteria for Apps

Change the Goals Prevention Cure Detection Diagnosis Recovery Damage Limitation

Detection - Transparency  Better Documentation from Developers – enforced by regulation/strict liability  Transparency of actions - what and why  More user control  Revelation of hidden processes  Integrity checks available to users

Call to Arms  Government  Developers  Academia  Professional Institutions

Government  The Law - strengthen enforcement  Spearhead Public Awareness  Seed-corn funding  Strengthen consumer power

Developers  Improve documentation and other aids to transparency  Strengthen acceptance critieria for public Apps  Provide for more user control  Meaningful monitoring and diagnostics to detect problems

Academia and Researchers  Education of programmers  Hardening Software  Assurance mechanisms to support the non- expert user

Professional Institutions  Advice on technical risks - lobbying Government  Engineering standards  Mitigating the amateur threat  Provide a counter to vested interests from industry

Conclusions 1  Infosec has failed to prevent or cure the ill- effects of the security challenges of the past 30 years  The environment is getting more challenging  The priority needs to shift to detection, recovery and damage limitation  The challenge from ubiquitous threat must be met by ubiquitous defence aimed at the non- expert consumer

Conclusions 2  Actions are needed to arm the consumer  This requires Government to act to counter the vested interests  In some areas Software Quality must improve; elsewhere an environment must be created to limit the damage from low-quality Apps.  The playing field must be tillted to protect the general non-expert user.