110 likes | 241 Vues
Access Security. Who you are What you have What you know. Who you are. Biometrics offer to uniquely identify individuals based on “wet-ware” Risk of becoming “dead-ware” if somebody wants your finger, eye-ball, voice, or face badly enough. What you have. Tokens, physical keys
E N D
Access Security • Who you are • What you have • What you know
Who you are • Biometrics offer to uniquely identify individuals based on “wet-ware” • Risk of becoming “dead-ware” if somebody wants your finger, eye-ball, voice, or face badly enough
What you have • Tokens, physical keys • Can get lost or stolen • Can be duplicated • Become complex
What you know • Passwords, logins • Human memory cannot meet requirements for complexity and length • Resort to writing things down, using the familiar • Carry around organizers and filofaxes to remember everything • Needs to be encrypted and protected – here we go again
Requirements of Secure Communication • Authentication • Authorization • Confidentiality • Integrity • Non-Repudiation
Implications • Tougher set of requirements than Access • Implies a coherent set of policies that are adhered to and managed on a continuous basis
Example – Firing an Employee • Who knows person is gone? • HR system tied to administrative systems? • Email • Physical Access • Return of Assets • System Access • Network Access • Spending Access • Reputational Access
Complexity vs. Security • Have the tools exceeded the capability of the owners • PABX as a loaded gun • Maintaining an NT server • Maintaining a firewall/Internet connection
What is in the back office? • Do you have documentation and control over the systems deployed? • Do you have process for managing your assets? • Do you have oversight of those in control of your systems? • Do you understand the risks?
Risks vs. Security • If you cannot quantify the risk, you cannot specify the security measures that are appropriate • Should the risk be transferred to another party? • We use insurance to mitigate risk • We can use service providers in same role
Ultimate Risk • If I compromise your systems, I “own” your business • Examples of disgruntled employees sabotaging systems • In case of US Engineering firm, they effectively are out of business • In case of HP, reputational damage for SuperDome servers