Download presentation
Presentation is loading. Please wait.
Published byTerence Elliott Modified over 9 years ago
1
Ronnie Mullins By: Ronnie Mullins
2
History Developed by the U.S. Military Prevents (or at least delays) an attacker Also implemented in Fire Prevention and Rescue Safety, Engineering, Nuclear Safety, and Information Security Protects information/data - Critical - Confidential - Private
3
DiD Layers
5
C – I - A Confidentiality - Privacy - Encryption - Verification/Authentication Integrity - Consistency, Accuracy, and Trustworthiness - Checksums Availability - Prevention of data loss - Backups
6
DiD Strategies
7
Microsoft Bitlocker Full-Disk Encryption AES-128/256 (Advanced Encryption Standard 128-bit/256-bit) CBC (Cipher Block Chaining) Secures “Host” Defense in Depth layer Removable Media Encryption Multi-factor authentication – PIN (something you know) – TPM (something you have – or something your computer has) – USB (something you have)
8
Cipher Block Chaining
9
References http://en.wikipedia.org/wiki/Defense_in_depth_(computing) http://en.wikipedia.org/wiki/Information_security http://whatis.techtarget.com/definition/Confidentiality-integrity-and- availability-CIA http://whatis.techtarget.com/definition/Confidentiality-integrity-and- availability-CIA
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.