Download presentation
Presentation is loading. Please wait.
Published byWarren Lester Modified over 9 years ago
1
CSCE 548 Security Standards Awareness and Training
2
CSCE 548 - Farkas2 Cyber Attacks Takes advantage of weakness in – Physical environment – Computer system – Software bugs – Human practices Need to identify, remove, and tolerate vulnerabilities
3
Secure Programs How do we keep programs free from flaws? How do we protect computing resources against programs that contain flaws? CSCE 548 - Farkas3
4
What is Secure? Characteristics that contribute to security – Who defines the characteristics? Assessment of security – What is the basis for the assessment? IEEE Standard for Software Verification and Validation, 2005 – Bug, error, fault, … CSCE 548 - Farkas4
5
Proof of Program Correctness Correctness: a given program computes a particular result, computes it correctly, and does nothing beyond what it is supposed to do. Program verification: – Initial assertion about the inputs – Checking if the desired output is generated – Problems: correctness depends on how the program statements are translated into logical implications, difficult to use and not intuitive, less developed than code production CSCE 548 - Farkas5
6
Standards of Program Development Software development organizations: specified software development practices Administrative control over: – Design – Documentation, language, coding style – Programming – Testing – Configuration management CSCE 548 - Farkas6
7
Process Management Human aspects: difficult to judge in advance How to assure that software is built in an orderly manner and that it leads to correct and secure product? – Process models: examine how and organization does something CSCE 548 - Farkas7
8
8 Reading Reading for this lecture: Carnegie Mellon, Software Engineering Institute (SEI): Capability Maturity Model Integration (CMMI®), http://www.sei.cmu.edu/cmmi/ http://www.sei.cmu.edu/cmmi/ US National Security Agency: System Security Engineering CMM (SSE CMM), http://www.sse-cmm.org/index.htmlhttp://www.sse-cmm.org/index.html Recommended DOD 8570.01-M, Information Assurance Workforce Improvement Program, http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf Certified Information Systems Security Professional (CISSP), http://www.isc2.org/cissp/default.aspx http://www.isc2.org/cissp/default.aspx
9
CSCE 548 - Farkas9 National Training Standards Committee on National Security Systems (CNSS) and the National Security Agency (NSA) National Training Standards – NSTISSI-4011, National Training Standard for Information Systems Security (INFOSEC) Professionals NSTISSI-4011 – CNSSI-4012, National Information Assurance Training Standard for Senior Systems Managers (SSM) CNSSI-4012 – NSTISSI-4013, National Information Assurance Training Standard For System Administrators (SA) NSTISSI-4013 – NSTISSI-4014, Information Assurance Training Standard for Information Systems Security Officers (ISSO) NSTISSI-4014 – NSTISSI-4015, National Training Standard for Systems Certifiers (SC) NSTISSI-4015 – CNSSI-4016, National Information Assurance Training Standard For Risk Analysts (RA) CNSSI-4016
10
National Standards and Certifications National Standards and Certifications
11
CSCE 548 - Farkas11 NSTISSI-4011 National Training Standard for Information Systems Security (INFOSEC) Professionals Provides the minimum course content for the training of information systems security (INFOSEC) professionals in the disciplines of telecommunications security and automated information systems (AIS) security.
12
CSCE 548 - Farkas12 NSTISSI-4011 National Security Telecommunications and Information Systems Security Directive No. 501 establishes the requirement for federal departments and agencies to implement training programs for INFOSEC professionals. INFOSEC professionals: responsible for the security oversight or management of national security systems during phases of the life cycle
13
CSCE 548 - Farkas13 NSTISSI-4011 Training Standards: two levels – “Awareness Level: Creates a sensitivity to the threats and vulnerabilities of national security information systems, and a recognition of the need to protect data, information and the means of processing them; and builds a working knowledge of principles and practices in INFOSEC.”
14
CSCE 548 - Farkas14 Awareness-level Instructional Content Behavioral Outcomes Topical Content
15
CSCE 548 - Farkas15 Program of Instructions a. COMMUNICATIONS BASICS (Awareness Level) b. AUTOMATED INFORMATION SYSTEMS (AIS) BASICS (Awareness Level) c. SECURITY BASICS (Awareness Level) d. NSTISS BASICS (Awareness Level) e. SYSTEM OPERATING ENVIRONMENT (Awareness Level) f. NSTISS PLANNING AND MANAGEMENT (Performance Level) g. NSTISS POLICIES AND PROCEDURES (Performance Level)
16
CSCE 548 - Farkas16 Information Systems Security Model Acknowledges information, not technology, as the basis for our security efforts – The actual medium is transparent – Eliminates unnecessary distinctions between Communications Security (COMSEC), Computer Security (COMPUSEC), Technical Security (TECHSEC), and other technology-defined security sciences – Can model the security relevant processes of information throughout an entire information system
17
CSCE 548 - Farkas17 Security Model Confidentiality Integrity Availability Characteristics Transmission StorageProcessing State Third Dimension Technology Policy Education, training, awareness
18
CSCE 548 - Farkas18 Performance Level Skill or ability to design, execute, or evaluate agency INFOSEC security procedures and practices Employees are able to apply security concepts while performing their tasks
19
Meeting National Standards at USC Current certifications: – NSTISSI-4011, National Training Standard for Information Systems Security (INFOSEC) Professionals NSTISSI-4011 – NSTISSI-4013, National Information Assurance Training Standard For System Administrators (SA) NSTISSI-4013 – NSTISSI-4014, Information Assurance Training Standard for Information Systems Security Officers (ISSO) NSTISSI-4014 Courses to take: – CSCE 522, CSCE 715, CSCE 727 CSCE 548 - Farkas19
20
GOVERNMENT AND INDUSTRY CERTIFICATIONS CSCE 548 - Farkas20
21
Computer Security Certifications International Information Systems Security Certification Consortium, (ISC) 2 – CISSP: Certified Information Systems Security Professional – ISSAP: Information Systems Security Architecture Professional – ISSEP: Information Systems Security Engineering Professional Computing Technology Industry Association (CompTIA) – Security+ (2008): security topics, e.g., access control, cryptography, etc. Information Systems Audit and Control Association (ISACA) – CISA: Certified Information Systems Auditor – CISM: Certified Information Security Manager CSCE 548 - Farkas21
22
CSCE 548 - Farkas22 Certified Information Systems Security Professional (CISSP) June, 2004, the CISSP program earned the ANSI ISO/IEC Standard 17024:2003 accreditation Formally approved by DoD in categories: Information Assurance Technical (IAT) and Managerial (IAM) categories Has been adopted as a baseline for the U.S. National Security Agency's ISSEP program
23
CSCE 548 - Farkas23 CISSP – Common Body of Knowledge Ten areas of interest (domains): 1. Access Control -- CSCE 522, 715 2. Application Security -- CSCE 522, 548 3. Business Continuity and Disaster Recovery Planning -- CSCE 522, 727 4. Cryptography -- CSCE 522, 557 5. Information Security and Risk Management -- CSCE 522, 548, 727 6. Legal, Regulations, Compliance and Investigations -- CSCE 517, 727 7. Operations Security -- CSCE 522, 548, 727 8. Physical (Environmental) Security -- CSCE 522. 727 9. Security Architecture and Design -- CSCE 522, 548, 715, 727 10. Telecommunications and Network Security -- CSCE 522, 715
24
Requirements 5 years of direct full-time security work experience in two or more of the ten (ISC)² information security domains – Associate of (ISC)²: passing the CISSP examination but not having the experience CISSP Code of Ethics Criminal history and related background Pass the CISSP exam with a scaled score of 700 points or greater Have their qualifications endorsed by another (ISC)² certified professional in good standing CSCE 548 - Farkas24
25
Validity of the Certification 3 years Renewal: – Retake the exam or – Report 120 Continuing Professional Education (CPE) credits CSCE 548 - Farkas25
26
Criticisms of the CISSP Lacking a business orientation Inferiority to Academic credentials CSCE 548 - Farkas26
27
CSCE 548 - Farkas27 Specialized Concentrations Information Systems Security Architecture Professional (ISSAP), Concentration in Architecture Information Systems Security Engineering Professional (ISSEP), Concentration in Engineering Information Systems Security Management Professional (ISSMP), Concentration in Management
28
CSCE 548 - Farkas28 Other (ISC)2 Certifications SSCP - Systems Security Certified Practitioner CAP - Certification and Accreditation Professional CSSLP - Certified Secure Software Lifecycle Professional
29
SECURITY ENGINEERING CSCE 548 - Farkas29
30
Security Process Models Capability Maturity Model (CMM): address organizations not products ISO 9001: similar to CMM U.S. NSA: System Security Engineering CMM (SSE-CMM) CSCE 548 - Farkas30
31
Capability Maturity Model Service mark owned by Carnegie Mellon University (CMU) Software Engineering Institute Development model, derived from data collected from organizations Can be applied to the software development process of organizations, to improve the process CSCE 548 - Farkas31
32
Capability Maturity Model Integration (CMMI) Problem with CMM: difficult to apply multiple models that are not integrated Extra cost CSCE 548 - Farkas32
33
CMM Structure Maturity Levels: a 5-Level process maturity continuum Key Process Areas: a cluster of related activities Goals: summarize the states that must exist for that key process area to have been implemented in an effective and lasting way Common Features Key Practices CSCE 548 - Farkas33
34
SEE-CMM Aims to advance the Security Engineering discipline Goals: – Enable the selection of qualified security engineering providers – Support informed investment in security engineering practices – Provide capability-based assurance CSCE 548 - Farkas34
35
Maturity Levels Define ordinal scale for measuring and evaluating process capability Define incremental steps for improving process capability CSCE 548 - Farkas35
36
Capability Levels 1. Initial : the starting point for use of a new process 2. Repeatable: Requirements management, Software project planning, Software project tracking and oversight, Software quality assurance, etc. 3. Defined: Organization process focus, Organization process definition, Training program, Integrated software management, Software product engineering, etc. 4. Managed: Quantitative process management, Software quality management 5. Optimizing: Defect prevention, Technology change management, Process change management CSCE 548 - Farkas36
37
Maturity Levels 1. Informal: base practices, ad-hoc process, success depends on individual effort 2. Planned, tracked: plan, track and verify performance, disciplined performance 3. Well defined: define and perform standard process, coordinate practices 4. Quantitatively controlled: establish measurable quality goals, objectively manage performance 5. Continuously improving: improve organizational capability, improve process effectiveness CSCE 548 - Farkas37
38
Security Engineering Process Areas Administer System Security Controls Assess Operational Security Risk Attack Security Build Assurance Argument Coordinate Security Determine Security Vulnerabilities Monitor System Security Posture Provide Security Input Specify Security Needs Verify and Validate Security CSCE 548 - Farkas38
39
Evaluation Phases: – Planning Phase: scope and plan – Preparation Phase: prepare evaluation team, questionnaire, collect evidence, analyze results – On-site phase: interview, establish findings, rating, report – Post-evaluation phase: report findings needs for improvement, manage results Use of evaluation: – Organizations to hire developers CSCE 548 - Farkas39
40
Problems with SSE-CMM Does not guarantee good results Need to ensure uniform evaluation Need good understanding of model and its use Does not eliminate the need for testing and evaluation No guarantee of assurance CSCE 548 - Farkas40
41
NATIONAL SECURITY CSCE 548 - Farkas41
42
CSCE 548 - Farkas42 National Security and IW U.S. agencies responsible for national security: large, complex information infrastructure Defense information infrastructure supports: – Critical war-fighting functions – Peacetime defense planning – Information for logistical support – Defense support organizations Need proper functioning of information infrastructure “Digitized Battlefield”
43
CSCE 548 - Farkas43 National Security and IW Increased reliance on information infrastructure – Information Dominance – Un-manned weapons – Communication infrastructure – Vital human services (e.g., transportation, law enforcement, emergency, etc.) Heavily connected to commercial infrastructure – 95% of DOD’s unclassified communication via public network No boundaries, cost effectiveness, ambiguous
44
CSCE 548 - Farkas44 Strategic Warfare (SW) Cold War: “single class of weapons delivered at a specific range” (Rattray) – E.g., use of nuclear weapons with intercontinental range Current: “variety of means … can create “strategic” effects, independent of considerations of distance and range.” Center of gravity: – Those characteristics, capabilities, or sources of power from which a military force derives its freedom of action, physical strength, or will to fight (DOD)
45
CSCE 548 - Farkas45 Strategic Information Warfare (SIW) “…means for state and non-state actors to achieve objectives through digital attacks on an adversary’s center of gravity.” (Rattray)
46
CSCE 548 - Farkas46 Strategic Warfare vs. SIW Similar challenges Historical observation: centers of gravity are difficult to damage because of – Resistance – Adaptation
47
CSCE 548 - Farkas47 Dimensions of Strategic Analysis Threads: – Need to related means to ends – Interacting with opponent capable of independent action Distinction between” – “Grand Strategy”: achievement of political object of the war (includes economic strength and man power, financial pressure, etc.) – “Military Strategy”: gain object of war (via battles as means)
48
CSCE 548 - Farkas48 Necessary conditions for SW Offensive freedom of action Significant vulnerability to attack Prospects for effective retaliation and escalation are minimized Vulnerabilities can be identified, targeted, and damage can be assessed
49
CSCE 548 - Farkas49 SIW Growing reliance new target of concern Commercial networks for crucial functions Rapid change Widely available tools Significant uncertainties – Determining political consequences – Predicting damage, including cascading effects
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.