Download presentation
Presentation is loading. Please wait.
Published byMaryann Copeland Modified over 9 years ago
1
1 A Comprehensive Framework for Information Assurance Abe Usher, CISSP
2
2 Agenda Introduction Information Assurance defined What you need to know A comprehensive (lightweight) framework Demonstrations IATAC resources Questions
3
3 Introduction: whoami Deputy Director of the Information Assurance Technology Analysis Center (IATAC)Information Assurance Technology Analysis Center Certified Information Systems Security Professional (CISSP) M.S. in Information Systems Creator of the INFOSEC ZeitgeistINFOSEC Zeitgeist Former infantry officer Geek
4
4 Introduction: purpose To provide an information briefing on a simple, yet comprehensive framework for thinking about Information Assurance (IA) issues
5
5 IA defined: old perspective Information Security: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.[1]” John McCumber, 1991
6
6 IA defined: contemporary perspective Information Assurance: “Information Operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for the restoration of information systems by incorporating protection, detection, and reaction capabilities.[2]” confidentiality- assurance that information is not disclosed to unauthorized individuals, processes, or devices. integrity- quality of an IS reflecting the logical correctness and reliability of the operating system; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. availability- timely, reliable access to data and information services for authorized users. NSTISSI No. 4009, "National IA Glossary," May 2003
7
7 What you “need to know” Technologist perspective –TCP/IP stack details –Firewalls –Intrusion detection –Anti-virus –INFOSEC Research Council hard problems list Policy perspective: –DoD 8500 series documents –DoD 5200 series documents –DoD 8100 series documents –NIST 800 series documents –National Strategy to Secure Cyberspace –DoD IA Strategy –DITSCAP / NIACAP Operator perspective: –IS Alliance: Common Sense Guide for Home and Individual Users –IS Alliance: Common Sense Guide for Senior Managers
8
8 Common criteria
9
9 What you “need to know” Do we lose the forest while looking at the trees?
10
10 Thoughts on classification “The beginning of all understanding is classification.” Hayden White
11
11 A comprehensive, yet “lightweight” framework
12
12 Thoughts on classification “Classification is, in fact, a general method used by us all for dealing with information… So by classification we can organize our knowledge of the [plant kingdom] into a system which stores and summarizes our information for us in a convenient manner… Clearly, some systems by which we can organize this knowledge, make generalizations and predictions, and simply reduce the sheer bulk of data with which we have to deal, is not only desirable but essential.” Charles Jefferies An Introduction to Plant Taxonomy
13
13 A comprehensive, yet lightweight framework
14
14 A comprehensive, yet lightweight framework
15
15 A comprehensive, yet lightweight framework
16
16 A comprehensive, yet lightweight framework
17
17 Case study: confidentiality of information in transmission Alice views an information resource belonging to Bob using a plain text protocol Information state: transmission Security service: confidentiality Security countermeasure: encryption [3], secure transmission medium, frequency hopping, obscure system interface, access controls
18
18 Case study: confidentiality of information in transmission
19
19 Interactive Web based version
20
20 Case study: availability of net based resources Bob wants to view a Web resource belonging to Alice Information state: storage, transmission Security service: availability Security countermeasure: traffic filtering/blocking [4], rate limiting, functional redundancy, data redundancy, load balancing, acceptable use policy, business continuity of operations plan
21
21 Case study: availability of net based resources
22
22 A comprehensive, yet lightweight framework
23
23 IATAC Resources IAnewsletter IA Digest Technical inquiries Technical repository On the Web at: –http://iac.dtic.mil/iatachttp://iac.dtic.mil/iatac –https://iatac.dtic.smil.milhttps://iatac.dtic.smil.mil
24
24 Questions
25
25 Backup slides
26
26 References [1] McCumber, John. "Information Systems Security: A Comprehensive Model". Proceedings 14th National Computer Security Conference. National Institute of Standards and Technology. Baltimore, MD. October 1991. [2] NSTISSI No. 4009, "National INFOSEC Glossary," January 1999. [3] OpenSSH protocol. Designed through the OpenBSD project at http://www.openbsd.org/. Latest release September 2003. http://www.openbsd.org/ [4] Linux Planet. Traffic filtering by IP Address. http://www.linuxplanet.com/linuxplanet/tutorials/1527/5/. February 2000. http://www.linuxplanet.com/linuxplanet/tutorials/1527/5/ [5] Maconachy, Victor, Corey Schou, Daniel Ragsdale, and Don Welch. "A Model for Information Assurance: An Integrated Approach". Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. U.S. Military Academy. West Point, NY. June 2001.
27
27 Information Security Zeitgeist Provides a graphical depiction of the emergence and disappearance of hot topics in information security over time Inspired by the Google Zeitgeist report On the Web: http://www.sharp-ideas.net/research/infosec_zeitgeist.html http://www.sharp-ideas.net/research/infosec_zeitgeist.html http://www.google.com/press/zeitgeist.html http://www.google.com/press/zeitgeist.html
28
28 Information Security Zeitgeist
29
29 Information Security Zeitgeist
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.