advertisement

Immune IT: Moving from Security to Immunity

67 %
33 %
advertisement
Information about Immune IT: Moving from Security to Immunity
Technology

Published on January 1, 2009

Author: amiable_indian

Source: slideshare.net

advertisement

Immune IT Moving from Security to Immunity... -Ajit Hatti Club Hack 2008 Presentation

Contents - I Security : What is it? Security : Why we need it? Security : How we see it? Security : What does it cost? Security : Do we own it? Security : How much is adequate?

Security : What is it?

Security : Why we need it?

Security : How we see it?

Security : What does it cost?

Security : Do we own it?

Security : How much is adequate?

Contents II Immunity : What is it? Immunity : How much does it cost? Immunity : Who is responsible? Immunity : How to get it?

Immunity : What is it?

Immunity : How much does it cost?

Immunity : Who is responsible?

Immunity : How to get it?

Contents III Requirement Gathering & Analysis Designing a Solution Coding & Reviews Testing Documentation/User Guide Deployment Maintenance

Requirement Gathering & Analysis

Designing a Solution

Coding & Reviews

Testing

Documentation/User Guide

Deployment

Maintenance

Security : What is it?

Security: Why do we need it?

Security: How we see it?

Security : What does it cost? An average annual Security Overheads incurred at prime organizations Expense incurred on security system - 20% Computational resources engaged in security operations - 15% Each person spending time on securing personal assets - 21% Latency introduced due to security operations per connection - 2 sec / MB . Data transfer only for security updates - 17 % And these figures are bound to increase. ( http://www.itbusinessedge.com/blogs/top/?p=207 )

An average annual Security Overheads incurred at prime organizations

Expense incurred on security system - 20%

Computational resources engaged in security operations - 15%

Each person spending time on securing personal assets - 21%

Latency introduced due to security operations per connection - 2 sec / MB .

Data transfer only for security updates - 17 %

And these figures are bound to increase. ( http://www.itbusinessedge.com/blogs/top/?p=207 )

Security : Do we own it?

Security: How much is adequate?

Immunity: What is it?

Immunity: How much does it costs?

Immunity: Who is Responsible ?

Immunity: How to achieve it? Embedding Security in each and every steps of our engineering process. Practice Security; integrate it in all operations. Greater awareness.

Embedding Security in each and every steps of our engineering process.

Practice Security; integrate it in all operations.

Greater awareness.

Requirement Gathering & Analysis Implicit Security Considerations Explicit Security Considerations

Implicit Security Considerations

Designing a Solution Confidentiality Enforcing access privileges. Encryption & Leakage prevention. Integrity Defining the limits Backup and Recovery Availability Business Continuity Plan. Troubleshooting & Failure recovery support

Confidentiality

Enforcing access privileges.

Encryption & Leakage prevention.

Integrity

Defining the limits

Backup and Recovery

Availability

Business Continuity Plan.

Troubleshooting & Failure recovery support

Coding and Reviews Code Should be : Less Clear Secure Review for : Validations Possible memory corruptions Initializations

Code Should be :

Less

Clear

Secure

Review for :

Validations

Possible memory corruptions

Initializations

Testing Sanity Checks Challenging Access control Fuzzing Vulnerability and Pen-Testing Dog fooding

Sanity Checks

Challenging Access control

Fuzzing

Vulnerability and Pen-Testing

Dog fooding

Documentation/User Guides Enforcing access control & encryption. Changing the default configurations, settings and passwords. Methods of backup and recovery etc. Advisory on best practices, do’s and don’ts. Known issues and workarounds.

Enforcing access control & encryption.

Changing the default configurations, settings and passwords.

Methods of backup and recovery etc.

Advisory on best practices, do’s and don’ts.

Known issues and workarounds.

Deployment & Maintanance Deploy the solutions with feasibly best & secure configuration. Follow best practices. Apply security updates, patches provided by vendors. Conduct security audits for the system

Deploy the solutions with feasibly best & secure configuration.

Follow best practices.

Apply security updates, patches provided by vendors.

Conduct security audits for the system

Security is defined by CIA . Addressing CIA at each phases of engineering results in Immunity. Security must be integr ated in our thoughts , process and operations. Immunity comes through ow ne rship of se curity . Conclusion

Security is defined by CIA .

Addressing CIA at each phases of engineering results in Immunity.

Security must be integr ated in our thoughts , process and operations.

Immunity comes through ow ne rship of se curity .

 

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Immune IT Moving from Security to Immunity... -Ajit Hatti

ClubHack 2008 Presentation Immune IT Moving from Security to Immunity...-Ajit Hatti Contents - I Security : What is it? Security : Why we need it?
Read more

Do "Pet Immunity" Motion Detectors Really Work? - Google ...

Do "Pet Immunity" Motion Detectors Really Work? ... home is usually moving apace, ... Hammonton Alarm Company SafetyFirst Security Systems
Read more

12.556 DIPLOMATS, DIPLOMATIC IMMUNITY, AND FOREIGN NATIONALS

request through the Department of Homeland Security, ... diplomatic immunity and foreign nationals. ... or warning for any moving violation.
Read more

Immunity Online - Home: Cell Press

... How An Immune Molecule Initiates ... 2016 issue and moving forward will reflect the revised co ... Learn more about the editors of Immunity.
Read more

Radio Transmitters and Home Security Systems - Portal

alarm system and can detect the body heat of a moving ... Radio Transmitters and Home Security Systems ... generally much less immune to false triggering ...
Read more

Immune to or from? Let's just say it depends | The ...

Immune to or from? Let's just say it depends - ... He says that immune might take either preposition "depending on nuance." ... Moving on . . .
Read more

Pet immune Motion Detector and the technology

... immunity technology analysis of motion detectors. Digital technology developing and more intelligent security ... immunity motion detector can identify ...
Read more