Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bruce Schneier Lanette Dowell November 25, 2009. Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.

Similar presentations


Presentation on theme: "Bruce Schneier Lanette Dowell November 25, 2009. Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with."— Presentation transcript:

1 Bruce Schneier Lanette Dowell November 25, 2009

2 Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics” – Bruce Schneier in Applied Cryptography 1996  Security is a chain It's only as secure as the weakest link.  Security is a process, not a product.

3 Part 1: The Landscape  Who are the attackers?  What do they want?  What do we need to deal with threats?

4 Part 1: The Landscape  Real life vs Digital World  Criminal Attacks “How can I acquire the maximum financial return by attacking the system?”  Privacy Violations  Publicity Attacks  Legal Attacks

5 Part 1: The Landscape  Who are the bad guys? Hackers Criminals / Organized Crime Insiders Industrial Espionage Press Terrorists National Intelligent Organizations Infowarriors

6 Part 1: The Landscape  What do we need? Privacy Multilevel security Anonymity Authentication Integrity

7 Part 2: Technologies  Examples of security technologies and their limitations  Cryptography

8 Part 2: Technologies  Identification and Authentication Passwords Biometrics Access Tokens

9 Part 2: Technologies  Networked-Computer Security Malicious Software ○ Viruses ○ Worms ○ Trojan Horses Websites ○ URL hacking ○ Cookies Etc…

10 Part 2: Technologies  Network Defences Firewalls DMZ (Demilitarized Zones) VPN (Virtual Private Networks) Honey Pots and Burglar Zones Vulnerability Scanners Email Security

11 Part 2: Technologies  Software Reliability Faulty code Buffer overflows “Computers are stupid”  Secure Hardware Putting a $100K lock on a cardboard house

12 Part 2: Technologies  Human Factor Social engineering Risks Insiders

13 Part 3: Strategies  Given the requirements of landscape, and the limitations of the technology, what do we do now?

14 Part 3: Strategies  Threat Modeling and Risk Assessment Attack Trees  Product testing Verification  More software complexity = more security risks (next slide, Windows…)

15 Part 3: Strategies  Lines of code in Windows:  Windows 3.1: 3 million  Windows NT: 4 million  Windows 95: 15 million  Windows NT 4.0: 16.5 million  Windows 98: 18 million  Windows 2000: 35-60 million

16 Conclusion  Computer bugs, vulnerabilities. Should they be published publically?  Work towards stronger software and hardware


Download ppt "Bruce Schneier Lanette Dowell November 25, 2009. Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with."

Similar presentations


Ads by Google