Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.

Similar presentations


Presentation on theme: "Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure."— Presentation transcript:

1 Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure (PKI)

2 Information Protection Requirements  Confidentiality –Protect from unauthorized disclosure  Integrity –Protect from unauthorized modification  Availability –Reliable/timely access to required resources  Authenticity –Ability to determine authorized source  Non-repudiation –Non-forgeable proof of data originator’s identity and data receipt

3 Types of Information Protection  Encryption  Access control  User identification and authentication  Malicious content detection (viruses)  Audits, including real-time intrusion- detection  Physical Security

4 Information Architecture Dimensions  Information System –Unauthorized intrusion –Denial of service  Information Domain –Users must have freedom of movement within their authorized spheres  Information Content –In-transit –At rest

5 PKI Public Key Infrastructure  Generation of digital certificates –Electronic proof of identity  Issuance of Certificate Revocation Lists (CRLs)  Directories that serve certificates and CRLs

6 PKI Terms  Certificate Authority (CA): Trusted agent that signs and issues digital certificate –Sets rules for use, –Publishes CRLs, –Posts to directory server  Registration Authority (RA): Verifies person’s identity, passes on to CA

7 Defense Messaging System  PKI by itself is considered medium grade security assurance  DMS involves PKI with modifications and additions –DMS is considered “high grade” assurance  Includes detailed policies and custom software  http://www.disa.mil/D2/dms/ http://www.disa.mil/D2/dms/

8 Further reading  DON CIO Information Technology Standards Guidance (1999)– Chapter 3 –http://www.doncio.navy.mil/training/ools/its g/chapter3.html http://www.doncio.navy.mil/training/ools/its g/chapter3.htmlhttp://www.doncio.navy.mil/training/ools/its g/chapter3.html  DoD Computer Emergency Response Team (CERT) –http://199.211.123.12/ http://199.211.123.12/


Download ppt "Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure."

Similar presentations


Ads by Google