Advanced Computer Science Security Theme
The Security Theme: an introduction
School of Computer Science The University of Manchester
1
The Security Theme: an introduction School of Computer Science The - - PowerPoint PPT Presentation
Advanced Computer Science Security Theme The Security Theme: an introduction School of Computer Science The University of Manchester 1 Advanced Computer Science Security Theme Outline Ratio of hackers to security professionals Why
Advanced Computer Science Security Theme
1
Advanced Computer Science Security Theme
professionals ~ 1000:1*
thermodynamics**
risks . . .
chain…
Security Theme!
**You can’t win . . . you can’t even break even 2
*SANS (SysAdmin, Audit, Network, Security) Institute
Advanced Computer Science Security Theme
3
Advanced Computer Science Security Theme
a day for one week], e-mail spam ($40 / 20K e-mails) and Web
spam ($2/30 posts)
spammed backlinks)
commission)
range anywhere from $500 to $10K Source: Fortinet 2013 Cybercrime Report 4
Advanced Computer Science Security Theme
5
Advanced Computer Science Security Theme
– Intrusion detection/prevention – Secure software – Authentication and authorisation – Virtual Private Networks – Firewalls – Digital certification and Public Key Infrastructures – Real-life exemplar security systems (cloud computing security, web security, email security wireless network security, electronic payment systems, etc)
6
Advanced Computer Science Security Theme
– CY40R; Digital forensics – McAfee; Malware and intruders: vulnerabilities and countermeasures – NCC Group; Penetration Testing
– Examination (60%) – Coursework (40%)
– Coursework (2x25%)
– Report – Risk treatment plan
– Examination (50%)
7
Advanced Computer Science Security Theme
Dependencies Business Impact (Value…C-I-A) Information Assets Risk Assessment (Risk Register) Risk Attitude People: Human Factors Behaviour Technology Process Controls Controls Controls Risk Treatments (Controls) Information Assets Information Assets Information Assets Realised Risk Business Continuity Security Incidents and Events
8
Advanced Computer Science Security Theme
Objectives IT Governance Risk Appetite Conformance Performance Monitor Ethical framework Portfolio Management Leadership Direct Evaluate Security Architecture Programme Management Project Management Development Operations Use Abuse Failure Dependencies Business Impact (Value…C-I-A) Information Assets Risk Assessment (Risk Register) Realised Risk Risk Attitude People: Human Factors Behaviour Technology Process Controls Controls Controls Risk Treatments (Controls) Business Continuity Security Incidents and Events Information Assets Information Assets Information Assets
IT Governance COMP60721
9
Advanced Computer Science Security Theme
malware per hour (McAfee)
Facebook…21,000 accepted
unencrypted laptop
details of a child sex abuse case to a member of the public
laptop with records of 46,000 people
10
Advanced Computer Science Security Theme
11
Advanced Computer Science Security Theme
And now Dr Zhang on some more projects…
12
Advanced Computer Science Security Theme
13
Advanced Computer Science Security Theme
– Inter-organisational resource sharing – Single sign-on – User identity privacy – Fine-grained access control
14
Advanced Computer Science Security Theme
for Handle Shib-HS Protected by F-LS User’s Home Site Web Server
is successful
with AuthService x
AuthServices x, y, z, … ASI-API Host Authentication Module (HAM) Browser PKCS#11 tokens, Java Cards, ... TI-API
WAYF SHAR SHIRE 8.Handle Shib Target - Resource Gateway
The Internet
dialogue
FAME Login Server (F-LS) Where Are You From?
15
Advanced Computer Science Security Theme
16
Advanced Computer Science Security Theme
– Your location
– Your device
– Your past access history/profile
17
Advanced Computer Science Security Theme
Context Acquisition Sensors Context Source Access Requester
Policy Store
Policy Policy Decision
Context Service PEP PDP Resource
18
Advanced Computer Science Security Theme
adaptation can increase reliability with low costs. A C B P Internet M X
19
Advanced Computer Science Security Theme
requirements for security (MARS)
to understand the costs and benefits of countermeasures
security threat analyser
preserve: designing a universal secure architecture
Legitimate use of the Dark Internet and Deep Web
controls with human factors
websites for compliance and award a commensurate trust mark
20
Advanced Computer Science Security Theme
21
Advanced Computer Science Security Theme
22