Dan Simon is wrong July 8, 1998. “What is Security?” “Security is about implementing people’s preferences for privacy, trust and information sharing (i.e.,

Slides:



Advertisements
Similar presentations
Managing Cyber-Identity, Authorization and Trust (and their inter-relationships) Prof. Ravi Sandhu Laboratory for Information Security Technology George.
Advertisements

Want to see the inside of my House? Follow me, for a guided tour You MUST have PowerPoint viewer to see this presentation Click your mouse to advance the.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Isaac peters Period 6. Used to take pictures of moments I want to remember To remember the times I go and I want show friends and family the good times.
Chapter Five Users, Groups, Profiles, and Policies.
Reflection (the act of considering and thinking): Take a moment to reflect about your first several months as a high school student. Think of your successes.
This title is for centering. This title is for centering. This title is for centering. This title is for centering.
Safety On The Internet Illinois Attorney General’s Office Naperville Police Department.
Blurring the Lines: Lesson plan on netiquette By David Kaufman EM 630: Cyberethics.
22-Jun-15 Labs, etc.. 2 Extra sessions Some of you are really new to computer programming, other have considerable experience I will have an extra weekly.
24-Jun-15 Labs, etc.. 2 Extra sessions Some of you are really new to computer programming, other have considerable experience I will have an extra weekly.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Do you know how to keep yourself safe?
Negotiating shared housing in austerity Britain: pragmatic responses and policy challenges HSA Annual Conference 2015: ‘Housing the Generations’ 9 th April.
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
1 What NOT to do I get sooooo Frustrated! Marking the SAME wrong answer hundreds of times! I will give a list of mistakes which I particularly hate marking.
While the market for new apartments is on the rise so is the increase in housing choices! According to the housing statistics.
Nick Stoneman Simon Moules.  I was a police officer  I was born on 7 th July 1970  I live at 167 Victoria Road, Rayleigh  I have three pets, a dog,
Introduction to System Administration CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Reflection (the act of considering and thinking): Take a moment to reflect about your first quarter at Ridgetop Junior High. Think about the learning you.
I'm thinking of a number. 12 is a factor of my number. What other factors MUST my number have?
“I am the way and the truth and the life. No one comes to the Father except through me” John 14:6.
Proposals. Introducing the Problem Depending on what your readers know Explain how the problem came to be Explain what attempts have been made to solve.
Creating the street of the future. In this project you get to create your own futuristic house using a tool called Google Sketchup. Afterwards you will.
LEADING INSTRUCTIONAL IMPROVEMENT
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
INTERNET SAFETY Holy Family Catholic School PTO Presentation for Parents – Guardians – Families.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
STOP Cyberbullying! Alex and Anika Cyber Safety Rule #1  If someone is posting mean things about you, use privacy tools to stop them. If you can’t stop.
Alexis, Tayla, and Helena’s presentation. Do’s and don'ts Do… Tell an adult Try to help the person being bullied Stand up for yourself Tell the bully.
LI: I can show what I already know about handling data Steps to Success… Give ideas of important words to contribute towards a mind map Be able to name.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Secure Operating Systems Lesson F: Capability Based Systems.
Public Services Skills
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Evaluating Service Users’ Perspectives of Coventry City Council’s Individual Budgets Pilot.
As I walk alone day by day. The thought of you comes to my mind.
Leveson Chapters 5 & 6 Gus Scheidt Joel Winstead November 4, 2002.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Sometimes Kids Whisper
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
What to say Lord? It’s You who gave me life and I Can’t explain just how Much You mean to me now That You have saved me, Lord I give all that I am to You,
Our Need for Peace April 3. Think about this … What kinds of situations give you the most peace? Jesus gives us true peace – Today we study how Jesus.
(Some helpful reminders on what happens when you cheat)
Interpreting School Rules
How to use the internet safely and How to protect my personal data?
Behavioral Design Patterns
“I am the way and the truth and the life
Modals of probability And their other uses.
Two friends. We two are friends. We are first meet in computer class. We do chat in whatapp. We two are friends. We are first meet in computer class.
Introduction to System Administration
He Is Able.
Feedback from people with learning disabilities
Porch Visits Professional Development and Facilitation
Resistance to Cultural Change
I am Thankful for…. By: Jessica.
Resistance to Cultural Change
Homework Let’s take up your homework.
Make Your Presence Real To Me
What makes a family?.
Mrs. Swagner Symbol 1 Symbol 2 Symbol 3 Symbol 4 ON THE BACK:
Independent Task – Level 7
Library Rules Mrs. Keep.
HONESTY.
Church Size - Matters Pop Quiz – Ready?.
Protect data in core business applications
Might Future possibility.
Presentation transcript:

Dan Simon is wrong July 8, 1998

“What is Security?” “Security is about implementing people’s preferences for privacy, trust and information sharing (i.e., their `Security Policies’)” “Security is about implementing people’s preferences for privacy, trust and information sharing (i.e., their `Security Policies’)” –Wrong (or incomplete) Security is also about eliminating unforeseen consequences Security is also about eliminating unforeseen consequences Constructing the policy is the hard part Constructing the policy is the hard part

You can’t handle the truth Who should be able to open the front door on my house? Who should be able to open the front door on my house? –Me, my family, our guests –Police, firefighters, paramedics  But they should be logged and audited –Locksmiths? It’s hard to construct the right lists It’s hard to construct the right lists Physical metaphors may not help Physical metaphors may not help

Social constructs Security policies are based on experience Security policies are based on experience Less experience on computers than in real world Less experience on computers than in real world Unforeseen consequences may be far more numerous Unforeseen consequences may be far more numerous Predicting consequences is computationally complex Predicting consequences is computationally complex Analogies may not maintain consequences Analogies may not maintain consequences

Desiderata I need an administrator I need an administrator –I’m not alone My policy might simply parameterize the administrator’s policy My policy might simply parameterize the administrator’s policy I need auditing I need auditing I need undo I need undo I need someone to explain my policy to me I need someone to explain my policy to me