Ronnie Mullins By: Ronnie Mullins
History Developed by the U.S. Military Prevents (or at least delays) an attacker Also implemented in Fire Prevention and Rescue Safety, Engineering, Nuclear Safety, and Information Security Protects information/data - Critical - Confidential - Private
DiD Layers
C – I - A Confidentiality - Privacy - Encryption - Verification/Authentication Integrity - Consistency, Accuracy, and Trustworthiness - Checksums Availability - Prevention of data loss - Backups
DiD Strategies
Microsoft Bitlocker Full-Disk Encryption AES-128/256 (Advanced Encryption Standard 128-bit/256-bit) CBC (Cipher Block Chaining) Secures “Host” Defense in Depth layer Removable Media Encryption Multi-factor authentication – PIN (something you know) – TPM (something you have – or something your computer has) – USB (something you have)
Cipher Block Chaining
References availability-CIA availability-CIA