women in technology 2009 mary henthorn. security prevent loss, theft, or inappropriate access...

19
Security and Privacy Women in Technology 2009 Mary Henthorn

Upload: lizette-botsford

Post on 30-Mar-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Security and PrivacyWomen in Technology

2009Mary Henthorn

Page 2: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Security◦Prevent loss, theft, or inappropriate access

Privacy◦Ensure freedom from intrusion or disturbance

Security Policies Protect Privacy

Security and Privacy

Page 3: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Who’s responsible?

Security and Privacy

Page 4: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Chief Executive Officer Chief Technology Officer Chief Security Officer IT Professional Other Business Mom Everyone

Women in IT

Page 5: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Physical

Logical

There Is No Perimeter

Page 6: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Cameras Logs Monitoring Breach notification letters Data backup tapes RFID

Security May Breach Privacy

Page 7: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Breach laws Freedom of information

$20 Million Settlement on VA Data Theft

State tape with data on 800,000 missing

TV News Crew – and You!

Page 8: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Know your enemies Classify your assets Identify constraints and parameters Assess risks Implement security, develop policies

Repeat!

What’s Your Strategy?

Page 9: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Physical◦Equipment failure◦Natural disaster◦Manmade disaster◦Theft

Logical◦Malware◦Denial of service◦Data corruption

Threats

Page 10: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Physical accessibility Physical weaknesses Location

People

Application weaknesses◦Memory, input, race, privilege, user interface

Inadequate access control

Vulnerabilities

Page 11: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Property◦Dollar value

Systems◦Criticality

Data◦Sensitivity

Classify Assets

Extremely

Critical

Critical

Not Critical

Page 12: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Laws

Regulations

Contracts

Policies

Constraints and Parameters

Page 13: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Violation of law Disclosure of personal information Violation of contracts, regulations, or policy Loss of revenue Misuse of resources Corruption of data Unavailable resources Loss of reputation Criminal or civil liability Loss of trust

Risks

Page 14: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

1. Use and update firewalls and anti-virus2. Properly setup and patch OS and applications3. Use appropriate authentication – passwords4. Lock unattended workstations5. Backup data6. Use the Internet with caution7. Be careful with email, social networking8. Review security regularly9. Respond to incidents appropriately10. Recognize security is everyone’s responsibility

Defensive Strategies

Page 15: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Layers of protection

◦Internet access point traffic analysis◦Router firewall◦Desktop firewall

◦Fence and secured gate◦Locked front door◦Locked office door

Defense in Depth

Page 16: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Variety of protection

◦Firewall◦Anti-virus◦Authentication

◦Security cameras◦Locked doors and file cabinets◦Scanners

Defense in Breadth

Page 17: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Be Informed, Stay Alert

Page 18: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Creative Office Security

Page 19: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security

Computer Emergency Readiness Team◦ www.uscert.gov

National Institute of Standards and Technology◦ www.nist.gov

Identity Theft◦ www.ftc.gov/idtheft

Arkansas Security◦ www.dis.arkansas.gov/security

Resources