Network location –Identify based on IP subnet –Can be difficult with mobile devices
Geolocation - determine a user’s location –GPS - mobile devices, very accurate –802.11 wireless, less accurate –IP address, not very accurate
Geofencing –Automatically allow or restrict access when the user is in a particular location –Don’t allow this app to run unless you’re near the office
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Protecting data
A
A primary job task –An organization is out of business without data
Data is everywhere –On a storage drive, on the network, in a CPU
Protecting the data –Encryption, security policies
Data permissions –Not everyone has the same access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Encryption
A
Encode information into unreadable data –Original information is plaintext, encrypted form is ciphertext
This is a two-way street –Convert between one and the other –If you have the proper key
Confusion –The encrypted data is drastically different than the plaintex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Hashing
A
Represent data as a short string of text –A message digest, a fingerprint
One-way trip –Impossible to recover the original message from the digest –Used to store passwords / confidentiality
Verify a downloaded document is the same as the original –Integrity
Can be a digital signature –Authentication, non-repudiation, and integrity –Will not have a collision (hopefully) –Different messages will not have the same hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Obfuscation
A
Obfuscate –Make something normally understandable very difficult to understand
Take perfectly readable code and turn it into nonsense –The developer keeps the readable code and gives you the chicken scratch –Both sets of code perform exactly the same way
Helps prevent the search for security holes –Makes it more difficult to figure out what’s happening –But not impossible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Masking
A
A type of obfuscation –Hide some of the original data
Protects PII –And other sensitive data
May only be hidden from view –The data may still be intact in storage –Control the view based on permissions
Many different techniques –Substituting, shuffling, encrypting, masking out, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Tokenization
A
Replace sensitive data with a non-sensitive placeholder –SSN 266-12-1112 is now 691-61-8539
Common with credit card processing –Use a temporary token during payment –An attacker capturing the card numbers can’t use them later
This isn’t encryption or hashing –The original data and token aren’t mathematically related –No encryption overhead
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Segmentation
A
Many organizations use a single data source –One large database
One breach puts all of the data at risk –You’re making it easy for the attacker
Separate the data –Store it in different locations
Sensitive data should have stronger security –The most sensitive data should be the most secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Permission restrictions
A
Control access to an account –It’s more than just username and password –Determine what policies are best for an organization
The authentication process –Password policies –Authentication factor policies –Other considerations
Permissions after login –Another line of defense –Prevent unauthorized access