Presentation is loading. Please wait.

Presentation is loading. Please wait.

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Similar presentations


Presentation on theme: "MANAGEMENT of INFORMATION SECURITY, Fifth Edition"— Presentation transcript:

1 MANAGEMENT of INFORMATION SECURITY, Fifth Edition

2 Introduction to Protection Mechanisms
Management of Information Security, 5th Edition, © Cengage Learning

3 Introduction to Protection Mechanisms
Technical controls alone cannot secure an IT environment, but they are an essential part of the InfoSec program Managing the development and use of technical controls requires some knowledge and familiarity with the technology that enables them Technical controls can enable policy enforcement where human behavior is difficult to regulate Management of Information Security, 5th Edition, © Cengage Learning

4 Management of Information Security, 5th Edition, © Cengage Learning
Sphere of Security Management of Information Security, 5th Edition, © Cengage Learning

5 Access Controls and Biometrics
Access controls regulate the admission of users into trusted areas of the organization—both logical access to information systems and physical access to the organization’s facilities Access control encompasses four processes: Obtaining the identity of the entity requesting access to a logical or physical area (identification), Confirming the identity of the entity seeking access to a logical or physical area (authentication), Determining which actions that entity can perform in that physical or logical area (authorization), and Documenting the activities of the authorized individual and systems (accountability) A successful access control approach always incorporates all four of these elements (IAAA) Management of Information Security, 5th Edition, © Cengage Learning

6 Management of Information Security, 5th Edition, © Cengage Learning
Authentication There are three types of authentication mechanisms: Something a person knows (for example, a password or passphrase) Something a person has (for example, a cryptographic token or smart card) Something a person can produce (such as fingerprints, palm prints, hand topography, hand geometry, retina and iris scans; or a voice or signature that is analyzed using pattern recognition) These characteristics can be assessed through the use of biometrics Management of Information Security, 5th Edition, © Cengage Learning

7 Something A Person Knows
This authentication mechanism verifies the user’s identity by means of a password, passphrase, or other unique code, such as a PIN (personal identification number) The current industry best practice is for all passwords to have a minimum length of 10 characters and contain at least one uppercase letter, one lowercase letter, one number, and one system-acceptable special character, which of course requires systems to be case-sensitive These criteria are referred to as a password’s complexity requirement The passphrase and corresponding virtual password are an improvement over the standard password, as they are based on an easily memorable phrase Management of Information Security, 5th Edition, © Cengage Learning

8 eWallet from Ilium Software
Management of Information Security, 5th Edition, © Cengage Learning

9 Management of Information Security, 5th Edition, © Cengage Learning
Password Power *Estimated Time to Crack is based on an average 2015-era PC with an Intel i7-6700K Quad Core CPU performing Dhrystone GIPS (giga/billion instructions per second) at 4.0 GHz. Management of Information Security, 5th Edition, © Cengage Learning

10 Management of Information Security, 5th Edition, © Cengage Learning
Something A Person Has This authentication mechanism makes use of something (a card, key, or token) that the user or the system possesses One example is a dumb card (such as an ATM card) with magnetic stripes containing the digital (and often encrypted) PIN against which user input is compared Another example is the smart card which contains an embedded computer chip that can verify and validate information in addition to PINs Another device often used is the cryptographic token, a processor in a card that has a display Tokens may be either synchronous or asynchronous Management of Information Security, 5th Edition, © Cengage Learning

11 Management of Information Security, 5th Edition, © Cengage Learning
Access Control Tokens Management of Information Security, 5th Edition, © Cengage Learning

12 Something A Person Can Produce
This authentication mechanism takes advantage of something inherent about the user that is evaluated using biometrics Fingerprint comparison of the person’s actual fingerprint to a stored fingerprint Palm print comparison of the person’s actual palm print to a stored palm print Hand geometry comparison of the person’s actual hand to a stored measurement Facial recognition using a photographic ID card, in which a human security guard compares the person’s face to a photo Facial recognition using a digital camera, in which a person’s face is compared to a stored image Retinal print comparison of the person’s actual retina to a stored image Iris pattern comparison of the person’s actual iris to a stored image Management of Information Security, 5th Edition, © Cengage Learning

13 Something A Person Can Produce
Most of the technologies that scan human characteristics convert these images to obtain some form of minutiae—unique points of reference that are digitized and stored in an encrypted format Among all possible biometrics, only three human characteristics are usually considered truly unique: Fingerprints Retina of the eye (blood vessel pattern) Iris of the eye (random pattern of features found in the iris, including freckles, pits, striations, vasculature, coronas, and crypts) DNA or genetic authentication will be included in this category if it ever becomes a cost-effective and socially accepted technology Management of Information Security, 5th Edition, © Cengage Learning

14 Evaluating Biometrics
Biometric technologies are generally evaluated according to three basic criteria: The false reject rate (Type I Error): the percentage of authorized users who are denied access The false accept rate (Type II Error): the percentage of unauthorized users who are allowed access The crossover error rate (CER): the point at which the number of false rejections equals the false acceptances Management of Information Security, 5th Edition, © Cengage Learning

15 Recognition Characteristics
Management of Information Security, 5th Edition, © Cengage Learning

16 Ranking of Biometric Effectiveness and Acceptance
Management of Information Security, 5th Edition, © Cengage Learning


Download ppt "MANAGEMENT of INFORMATION SECURITY, Fifth Edition"

Similar presentations


Ads by Google