SlideShare una empresa de Scribd logo
1 de 40
Information Systems 365/765
 Information Systems Security and Strategy
                   Lecture 3
Data Classification and Data Loss Prevention
Today’s Agenda
• Discuss Frontline
  video,
  “Cyberwar” and
  assignment #1
• Discuss readings,
  Cyberwar,
  Chinese Hackers,
  Vendor Liability
• Lecture, Data
  Classification and
  Data Loss
  Prevention
Readings Are Now Online

• We are going to save some trees!
• Readings are all at:
  mywebspace.wisc.edu/ndavis1/365
• Readings are placed in the folders
  for each class session. For
  example, readings for Thursday,
  September 11, are in the
  September 11 folder
• Link to Cyberwar video is in
  September 4 folder
Cyberwar Video
• Overall, what did you think of the
  premise that both government
  and the private sector are at risk
  for cyber-attack?
• Can you think of specific
  businesses which should be
  concerned about cyber-attack?
The CIA Triad

• Confidentiality
• Integrity
• Availability

• The goals of a
  secure
  information
  system
Confidentiality
Confidentiality
• Confidentiality is
  assurance of data
  privacy
• Only the intended
  and authorized
  recipients:
  individuals,
  processes or
  devices, may read
  the data
• Disclosure to
  unauthorized
  entities must be
  avoided
• Examples - Rayovac
Ensuring Confidentiality
• Encryption of data
• Protecting the data with some type
  of authentication such as
  username/password
• Data handling policies
• Data storage policies
• Data retention policies

• Which of these are technical
  controls? Which are administrative
  controls?
Integrity

• Integrity is assurance of data
  and/or source non-alteration.
• Data integrity is having
  assurance that the information
  has not been altered in
  transmission, from origin to
  reception.
DICOM Example of Data
      Integrity
Source Integrity
• Source integrity
  is the assurance
  that the sender
  of information is
  who it is
  supposed to be.
• Source integrity
  is compromised
  when an agent
  spoofs its identity
  and supplies
  incorrect
  information to a
  recipient.
Spoofing Data and Source
            Integrity

• Data integrity can be
  compromised when
  information has been
  corrupted or altered, willfully
  or accidentally, before it is
  read by its intended recipient.
• We will study ways to avoid
  such spoofing
Ensuring Data Integrity

• Digitally sign
  the document
• Digital
  signature uses
  a checksum to
  ensure data
  integrity
How a Check Digit/Checksum
           Works
• A check digit consists of a single
  digit computed from the other
  digits in the message.
• This is accomplished with a simple
  formula
• More complex messages require
  the use of a checksum
Check Digit Example
• UW-Madison ID Card
• The last digit is a check digit
• Let’s use example “524” with a check
  digit of “3”, so your student ID might be
  “524 3”
• Formula example, check digit = first
  digit + second digit – third digit. In this
  case, 5 + 2 – 4 = check digit of 3
• Equipment reading your card can be
  programmed to make use of the check
  digit if it knows the formula for
  computing the check digit
Availability
• Availability is
  assurance in
  the timely and
  reliable access
  to data
  services for
  authorized
  users. It
  ensures that
  information or
  resources are
  available when
  required.
C&I Are Nothing Without the A
• Confidentiality and integrity
  can be protected, but an
  attacker causes resources to
  become less available than
  required, or not available at
  all.
• Denial of Service (DoS)
• Do you remember the DoS
  discussion on the video?
Ensuring Data Availability

• Fully redundant network
  architectures and system
  hardware without any single
  points of failure ensure
  system reliability and
  robustness.
• Virus scanning / malware
  scanning
• Striping of data across hot
  swappable disks, mirroring
  data, remote live site.
CIA Summary
• To secure data,
  you must
  ensure
  confidentiality,
  integrity and
  availability
• Be careful not
  to compromise
  confidentiality
  and integrity as
  you seek to
  provide
  availability
How Do We Know If Data
    Should Be Protected?
• Before we build
  a system to
  protect
  business data,
  we need to
  understand
  how to rate the
  sensitivity of
  business data
• This is done
  through data
  classification
Data Classification
• Data
  Classification is
  the conscious
  decision to assign
  a level of
  sensitivity to data
  as it is being
  created,
  amended,
  enhanced, stored,
  or transmitted.
Data Classification Levels

• Top Secret
• Highly Confidential
• Proprietary
• Internal Use Only
• Public Documents

• Terminology varies by
  organization
Top Secret
• Highly sensitive internal
  documents e.g. pending mergers
  or acquisitions; investment
  strategies; plans or designs
• Information classified as Top
  Secret has very restricted
  distribution and must be protected
  at all times. Security at this level is
  the highest possible.
Top Secret - Handling

• Must sign in to gain access to
  the data
• Must be supervised while
  viewing the data
• Must not remove the materials
  from the secure viewing area
• May not copy the data or even
  be in possession of devices
  which could copy the data,
  including pens and paper
Highly Confidential
• Information that, if made
  public or even shared around
  the organization, could
  seriously impede the
  organization’s operations and
  is considered critical to its
  ongoing operations.
Highly Confidential – Handling

• May only be shared with a
  specific list of people
• May not be copied
• May not leave the company’s
  physical location

• More administrative control
  here than with Top Secret
Proprietary
• Information of a proprietary
  nature; procedures,
  operational work routines,
  project plans, designs and
  specifications that define the
  way in which the organization
  operates.
Proprietary - Handling

• May only be shared with a
  specific list of people
• Copying is permitted but not
  encouraged
• May be taken off-site
• May not be shared with
  anyone outside the company
Internal Use Only

• Information not approved for
  general circulation outside the
  organization where its loss
  would inconvenience the
  organization or management
  but where disclosure is
  unlikely to result in financial
  loss or serious damage to
  credibility.
Internal Use Only - Handling

• Does not necessitate an
  authorization list
• May be copied without
  reservation
• May be taken off-site
• May not be shared with the
  public
Public Documents

• Information in the public
  domain; annual reports, press
  statements etc.; which has
  been approved for public use.
  Security at this level is
  minimal.
Public Documents - Handling

• No distribution list required
• May be copied at will
• May be taken off-site
• May be shared with anyone
  and even promoted
Data Loss Prevention (DLP)
         Technologies

• First classify your data
• Now, protect it appropriately
• Control the environment
• Control access to the data
• Protect while in transit
• Protect while in storage
Next Generation Compliance
           Filters

• Content filters for HIPAA, GLB,
  SOX and other regulations
  automatically scan emails for
  protected financial and health
  information. Easily extensible
  lexicons allow companies to
  customize these rules to meet
  specific requirements.
Appliance

Anti SPAM
Anti Spyware
Anti Virus
Host Based Software

• Virus Scanning on your
  workstation
• Personal software firewalls
Appliances vs. Host Based DLP

• Both provide some protection
• Host based is usually more
  configurable, but harder to
  manage, especially at remote
  locations
• Appliances are more rigid
Encryption
• Protects confidentiality
• Ensures recipient
  authentication (Only the
  intended recipient can decrypt
  the message)
• We will spend an entire
  lecture on email encryption
  and YOU will send encrypted
  email
Content Scanning

• Can be hardware or software
  based

• HTTP traffic, viruses, malware
• Phishing attempts
• Peer to Peer applications
• Instant Messaging
• Key loggers
Enterprise Management Tools

• The ability to know exactly
  what your users have been
  doing, in a form which can be
  audited. Web, email, etc.
• The ability to control the
  sending and receiving of
  specific content.
• Websense

Más contenido relacionado

La actualidad más candente

Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
Date security introduction
Date security   introductionDate security   introduction
Date security introductionLeo Mark Villar
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2FRSecure
 
Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3FRSecure
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 

La actualidad más candente (19)

Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2
 
Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 

Destacado

Classification of data
Classification of dataClassification of data
Classification of dataligaya06
 
Data classification
Data classificationData classification
Data classificationSilicon
 
Classification of data
Classification of dataClassification of data
Classification of datarajni singal
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 

Destacado (6)

18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Classification of data
Classification of dataClassification of data
Classification of data
 
Data classification
Data classificationData classification
Data classification
 
Classification of data
Classification of dataClassification of data
Classification of data
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Classification & tabulation of data
Classification & tabulation of dataClassification & tabulation of data
Classification & tabulation of data
 

Similar a Lecture data classification_and_data_loss_prevention

Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Aptera Inc
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Innovators
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security ResilienceJoel Aleburu
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptxAyeCS11
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flarezilberberg
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptxmissionsk81
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantKamruzzamansohel2
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 

Similar a Lecture data classification_and_data_loss_prevention (20)

Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptx
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 

Más de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

Más de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Lecture data classification_and_data_loss_prevention

  • 1. Information Systems 365/765 Information Systems Security and Strategy Lecture 3 Data Classification and Data Loss Prevention
  • 2. Today’s Agenda • Discuss Frontline video, “Cyberwar” and assignment #1 • Discuss readings, Cyberwar, Chinese Hackers, Vendor Liability • Lecture, Data Classification and Data Loss Prevention
  • 3. Readings Are Now Online • We are going to save some trees! • Readings are all at: mywebspace.wisc.edu/ndavis1/365 • Readings are placed in the folders for each class session. For example, readings for Thursday, September 11, are in the September 11 folder • Link to Cyberwar video is in September 4 folder
  • 4. Cyberwar Video • Overall, what did you think of the premise that both government and the private sector are at risk for cyber-attack? • Can you think of specific businesses which should be concerned about cyber-attack?
  • 5. The CIA Triad • Confidentiality • Integrity • Availability • The goals of a secure information system
  • 7. Confidentiality • Confidentiality is assurance of data privacy • Only the intended and authorized recipients: individuals, processes or devices, may read the data • Disclosure to unauthorized entities must be avoided • Examples - Rayovac
  • 8. Ensuring Confidentiality • Encryption of data • Protecting the data with some type of authentication such as username/password • Data handling policies • Data storage policies • Data retention policies • Which of these are technical controls? Which are administrative controls?
  • 9. Integrity • Integrity is assurance of data and/or source non-alteration. • Data integrity is having assurance that the information has not been altered in transmission, from origin to reception.
  • 10. DICOM Example of Data Integrity
  • 11. Source Integrity • Source integrity is the assurance that the sender of information is who it is supposed to be. • Source integrity is compromised when an agent spoofs its identity and supplies incorrect information to a recipient.
  • 12. Spoofing Data and Source Integrity • Data integrity can be compromised when information has been corrupted or altered, willfully or accidentally, before it is read by its intended recipient. • We will study ways to avoid such spoofing
  • 13. Ensuring Data Integrity • Digitally sign the document • Digital signature uses a checksum to ensure data integrity
  • 14. How a Check Digit/Checksum Works • A check digit consists of a single digit computed from the other digits in the message. • This is accomplished with a simple formula • More complex messages require the use of a checksum
  • 15. Check Digit Example • UW-Madison ID Card • The last digit is a check digit • Let’s use example “524” with a check digit of “3”, so your student ID might be “524 3” • Formula example, check digit = first digit + second digit – third digit. In this case, 5 + 2 – 4 = check digit of 3 • Equipment reading your card can be programmed to make use of the check digit if it knows the formula for computing the check digit
  • 16. Availability • Availability is assurance in the timely and reliable access to data services for authorized users. It ensures that information or resources are available when required.
  • 17. C&I Are Nothing Without the A • Confidentiality and integrity can be protected, but an attacker causes resources to become less available than required, or not available at all. • Denial of Service (DoS) • Do you remember the DoS discussion on the video?
  • 18. Ensuring Data Availability • Fully redundant network architectures and system hardware without any single points of failure ensure system reliability and robustness. • Virus scanning / malware scanning • Striping of data across hot swappable disks, mirroring data, remote live site.
  • 19. CIA Summary • To secure data, you must ensure confidentiality, integrity and availability • Be careful not to compromise confidentiality and integrity as you seek to provide availability
  • 20. How Do We Know If Data Should Be Protected? • Before we build a system to protect business data, we need to understand how to rate the sensitivity of business data • This is done through data classification
  • 21. Data Classification • Data Classification is the conscious decision to assign a level of sensitivity to data as it is being created, amended, enhanced, stored, or transmitted.
  • 22. Data Classification Levels • Top Secret • Highly Confidential • Proprietary • Internal Use Only • Public Documents • Terminology varies by organization
  • 23. Top Secret • Highly sensitive internal documents e.g. pending mergers or acquisitions; investment strategies; plans or designs • Information classified as Top Secret has very restricted distribution and must be protected at all times. Security at this level is the highest possible.
  • 24. Top Secret - Handling • Must sign in to gain access to the data • Must be supervised while viewing the data • Must not remove the materials from the secure viewing area • May not copy the data or even be in possession of devices which could copy the data, including pens and paper
  • 25. Highly Confidential • Information that, if made public or even shared around the organization, could seriously impede the organization’s operations and is considered critical to its ongoing operations.
  • 26. Highly Confidential – Handling • May only be shared with a specific list of people • May not be copied • May not leave the company’s physical location • More administrative control here than with Top Secret
  • 27. Proprietary • Information of a proprietary nature; procedures, operational work routines, project plans, designs and specifications that define the way in which the organization operates.
  • 28. Proprietary - Handling • May only be shared with a specific list of people • Copying is permitted but not encouraged • May be taken off-site • May not be shared with anyone outside the company
  • 29. Internal Use Only • Information not approved for general circulation outside the organization where its loss would inconvenience the organization or management but where disclosure is unlikely to result in financial loss or serious damage to credibility.
  • 30. Internal Use Only - Handling • Does not necessitate an authorization list • May be copied without reservation • May be taken off-site • May not be shared with the public
  • 31. Public Documents • Information in the public domain; annual reports, press statements etc.; which has been approved for public use. Security at this level is minimal.
  • 32. Public Documents - Handling • No distribution list required • May be copied at will • May be taken off-site • May be shared with anyone and even promoted
  • 33. Data Loss Prevention (DLP) Technologies • First classify your data • Now, protect it appropriately • Control the environment • Control access to the data • Protect while in transit • Protect while in storage
  • 34. Next Generation Compliance Filters • Content filters for HIPAA, GLB, SOX and other regulations automatically scan emails for protected financial and health information. Easily extensible lexicons allow companies to customize these rules to meet specific requirements.
  • 36. Host Based Software • Virus Scanning on your workstation • Personal software firewalls
  • 37. Appliances vs. Host Based DLP • Both provide some protection • Host based is usually more configurable, but harder to manage, especially at remote locations • Appliances are more rigid
  • 38. Encryption • Protects confidentiality • Ensures recipient authentication (Only the intended recipient can decrypt the message) • We will spend an entire lecture on email encryption and YOU will send encrypted email
  • 39. Content Scanning • Can be hardware or software based • HTTP traffic, viruses, malware • Phishing attempts • Peer to Peer applications • Instant Messaging • Key loggers
  • 40. Enterprise Management Tools • The ability to know exactly what your users have been doing, in a form which can be audited. Web, email, etc. • The ability to control the sending and receiving of specific content. • Websense