[email protected] security colin armstrong school of information systems curtin...

20
[email protected] Security Colin Armstrong School of Information Systems Curtin University [email protected] n.edu.au

Post on 21-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

[email protected]

Security

Colin ArmstrongSchool of Information Systems

Curtin University

[email protected]

[email protected]

Physical & Logical Security

Privacy………

Secrecy…………..

&

Netiquette………….

[email protected]

Basic Security

What do YOU think of when someone talks about SECURITY

National Security

Protecting Valuable Assets

Muscle Bound, Gun Toting Guards with Big Angry Dogs

Computer Sec – Information Sec – Internet / Network Sec

Your Address and Your Front Door Key

[email protected]

Is Security Important

We would probably all agree that security is important, BUT

Who To ? ? ? ? ? ? ? ?

Most people tend to think that it is ”Not Their Job”

Maybe 5% will pursue Security as a Career

But……..

Every single person here is continually effected by security.

[email protected]

Aims of Security

ConfidentialityAccess only by authorised personnel by authorised methods AvailabilityData and systems are up and running when needed

IntegrityModification only by authorised personnel by authorised methods

AuthenticityEnsuring authorised users, devices and transmissions

Non-repudiationDenial of action is not possible

[email protected]

Privacy

Privacy………

What are YOUR rights to privacy – Sweden, USA, Aust, etc.

What do you want to know about other people. Should you know where criminals now reside peadophiles

Echelon is listening to everything & recording it for 90 days

[email protected]

Surveillance for Fun

Surveillance is the new entertainment at the Remote Lounge in New York city, where revellers spy on each other with joystick-controlled cameras. When patrons think about being watched by others, says so-owner Kevin Centanni, “they’re taken aback by the lack of privacy.” But when they themselves watch other patrons, “they feel empowered.”

Shenk, D. (2003). "Watching You. The World of High-tech Surveillance." National Geographic 204. No 5(November 2003): pp 2 - 29.

Privacy

[email protected]

On a Scale of 1 – 5 with 1 being low and 5 being highRate the level of security you would place on Diplomatic Despatch…………..

Private Letter…………..

Post Card…………..

E-Mail…………..

Phone Text Message…………..

Privacy

[email protected]

How do you propose we achieve those levels of security

Diplomatic Despatch…………..

Private Letter…………..

Post Card…………..

E-Mail…………..

Phone Text Message…………..

Privacy

[email protected]

Secrecy

Secrecy, why.........

If you know a secret exists, how safe is it.

The trick is not to let anyone know that the secret exists

Classification systems attempt to address these issues.

[email protected]

What classification wasplaced on this information

Secrecy

[email protected]

What value .........Winning 6 numbers in Lotto........

What role is played by our News Services, Paper, TV, etc

Secrecy

[email protected]

Netiquette

Netiquette………….

Good Manners on the Internet

Culture of the community, Physical vs Logical Sweden / Iraq

&Ethics

.

[email protected]

Netiquette - Ethics

[email protected]

Netiquette

Is Netiquette a Security matter………….

By keeping a low profile, one is noticed less and thereforenot under as much scrutiny as others.......

Yes, even Netiquette can be a Security matter

.

[email protected]

Basic Tenents

The basic tenents of all SECURITYare:

Detect DelayDeter Respond

If you remember nothing else, remember this….

[email protected]

Security

Todays address briefly discussed ;

Privacy

Secrecy

&

Netiquette

[email protected]

Security

Security as a subject of research, teaching, and workis extraordinarily diverse.

Policy - Biometrics - Encryption & CommunicationsCrime, Law, Ethics, and Hacking - Internet - PhysicalInformation - Personnel - Intelligence - Executive Security Incident Response - Disaster Recovery PlanningInformation Warfare - Forensics

It is an exciting field of endeavour

[email protected]

Public Toilet Security

A physical security practitioner must address many needs…

Even, Public Toilet Security

This is no Joke, Think about it.

If we can apply Security here we can apply securityanywhere

By thinking of Security in the Physical World we can adaptand convert Security to the Logical World.

[email protected]

Comments – Questions

?Colin Armstrong

School of Information SystemsCurtin University

[email protected]