Download presentation
Presentation is loading. Please wait.
1
Bruce Schneier Lanette Dowell November 25, 2009
2
Introduction “It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics” – Bruce Schneier in Applied Cryptography 1996 Security is a chain It's only as secure as the weakest link. Security is a process, not a product.
3
Part 1: The Landscape Who are the attackers? What do they want? What do we need to deal with threats?
4
Part 1: The Landscape Real life vs Digital World Criminal Attacks “How can I acquire the maximum financial return by attacking the system?” Privacy Violations Publicity Attacks Legal Attacks
5
Part 1: The Landscape Who are the bad guys? Hackers Criminals / Organized Crime Insiders Industrial Espionage Press Terrorists National Intelligent Organizations Infowarriors
6
Part 1: The Landscape What do we need? Privacy Multilevel security Anonymity Authentication Integrity
7
Part 2: Technologies Examples of security technologies and their limitations Cryptography
8
Part 2: Technologies Identification and Authentication Passwords Biometrics Access Tokens
9
Part 2: Technologies Networked-Computer Security Malicious Software ○ Viruses ○ Worms ○ Trojan Horses Websites ○ URL hacking ○ Cookies Etc…
10
Part 2: Technologies Network Defences Firewalls DMZ (Demilitarized Zones) VPN (Virtual Private Networks) Honey Pots and Burglar Zones Vulnerability Scanners Email Security
11
Part 2: Technologies Software Reliability Faulty code Buffer overflows “Computers are stupid” Secure Hardware Putting a $100K lock on a cardboard house
12
Part 2: Technologies Human Factor Social engineering Risks Insiders
13
Part 3: Strategies Given the requirements of landscape, and the limitations of the technology, what do we do now?
14
Part 3: Strategies Threat Modeling and Risk Assessment Attack Trees Product testing Verification More software complexity = more security risks (next slide, Windows…)
15
Part 3: Strategies Lines of code in Windows: Windows 3.1: 3 million Windows NT: 4 million Windows 95: 15 million Windows NT 4.0: 16.5 million Windows 98: 18 million Windows 2000: 35-60 million
16
Conclusion Computer bugs, vulnerabilities. Should they be published publically? Work towards stronger software and hardware
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.