CNSS Security Model (Cont.) Most Challenging To Protect
CNSS Security Model (Cont.) Most Challenging To Protect
no explicit
protection of DLP
‘data in use’ System
https://sc1.checkpoint.com/documents/R77/CP_R77_DataLossPrevention_AdminGuide/62453.htm
CNSS Security Model (cont.)
But, what if no part of the network/environment
is trusted?!
(e.g., in case of Cloud Computing)
CNSS Security Model (cont.)
Example: Data that needs protection in the Cloud
CNSS Security Model (cont.)
Example: Homomorphic Encryption
http://www.slideshare.net/NYTechCouncil/computing-on-encrypted-data
CNSS Security Model (cont.)
Example: Homomorphic Encryption (cont.)
http://www.slideshare.net/NYTechCouncil/computing-on-encrypted-data
CNSS Security Model (cont.)
Countermeasures/Safeguards
Technology - software and hardware solutions (e.g.,
antivirus, firewalls, intrusion-detection systems, etc.)
Policy and practices - administrative controls, such as
management directives (e.g., acceptable use policies)
People - aka awareness, training, education - ensure
that users are aware of their roles & responsibilities
CNSS Security Model (cont.)
• Each of 27 cells in the cube represents an area that
must be addressed to secure an information system
e.g., intersection between data integrity, storage and
technology implies the need to use technology to protect
data integrity of information while in storage
solution: new ‘file check sum’ is calculated every time a critical
file is modified …
Desired goals:
Measures:
Information states:
CNSS Security Model (cont.)
Asset with v.
WiFi within
outside reach
Agent Event
Threat competitor
competitor
actually invests
interested in
time & effort to
seizing your
capture data
data
Asset with v.
data on a server,
not backuped!
Event
Threat
flood or fire
in the server room
Threats (cont.)
Example: outsider vs. insider, deliberate vs. accidental
Asset
with vulnerability
Threat
Agent Event
outsider deliberate
or insider or accidental
Asset
with vulnerability
Threat
Agent Event
deliberate
Treat Events
Intentional
Unintentional
Attacks
• Forces of Nature
fire, flood, earthquake, hurricane, tsunami, electrostatic
discharge, dust contamination
cannot be predicted/prevented
organization must implement controls to limit damage
as well as develop incident response plans and business
continuity plans
Threat Events: Unintentional / Human
• Act of Human Error or Failure
organization’s own employee’s are
one of its greatest threats
examples:
entry of erroneous data
accidental deletion or modification of data
failure to protect data
storing data in unprotected areas
http://www.cybercrime.gov/McKennaSent.htm
Threat Events: Intentional Attacks (cont.)
• Deliberate Act of Trespass
unauthorized access to info.
that an organization is trying
to protect
low-tech e.g.: shoulder surfing
high-tech e.g.: hacking