Title: Thinking About Security Your Next Step
1Thinking About Security -Your Next Step -
2CEENet NATO ANWon Network Security
Lake Ohrid, Macedonia - June 2005
3Inventing the alphabet for writing the language
of security.
4Goals of this Session
- How to think about security what is required to
ensure a complete view of security - Applying that thinking towards real-world work
- Appraising the value of what we have learned this
week - Where do you go from here?
5A thought to keep in mind as we think about the
changes we may require to secure our networks and
services
- Grant me the serenity to accept the things I
cannot change, - The courage to change the things I can,
- And the wisdom to know the difference.
Reinhold Niebuhr
6How to think about security
- What are the key components of a complete
approach to security?
7How to think about security
- What are the key components of a complete
approach to security? - What new security elements need to be added to
your network and applications? - Firewalls
- Enhances certificate and password control
- Better access management
- ?
8How to think about security
- What are the key components of a complete
approach to security? - What aspects of your current systems need to be
refined, reduced or eliminated? - Guest accounts
- Open Wireless networks
- Weak password controls
- Weak identification processes
- ?
9How to think about security
- What are the key components of a complete
approach to security? - What to you need to research, learn, invent,
discover, uncover? - What is available in the market today
- What are your skill sets, and what improvements
do you need to make - Is the existing technology appropriate for your
needs? - What dont you know that you dont know you dont
know? - ?
10How to think about security
- What are the key components of a complete
approach to security? - What resources will you need?
- Money
- People
- Time
- Knowledge
- Administrative support
- ?
11How to think about security
- What are the key components of a complete
approach to security? - What is your role or identity in security and
what is your networks role? - Define the tasks for others to perform
- Dictate what needs to be done
- Assist others in developing a plan
- Lead a collective process
- Mandate change, and supply resources
- ?
12How to think about security
- What are the key components of a complete
approach to security? - Who do you need to be working and interact with
to achieve success? - Other NRENs
- Vendors
- Users
- Administration
- ?
13How to think about security
Research
New
Identity
Refine
Interact
Resources
14How to think about security?What relationships
do you see?
Research
New
Identity
?
Refine
Interact
Resources
15How to think about security?Not as parts, but as
a whole
Research
New
Identity
Refine
Interact
Resources
16Applying that thinking towards real-world work
- What do you plan to do?
- Why do you need to do this?
- Who will benefit from this?
- What is that benefit, and how will this help them?
- Task
- Reason
- For whom
- The result
17Applying that thinking towards real-world work
- What will you need to complete this work?
- Knowledge
- Skills
- Capabilities
- Time
- Money
- Products and Services
- Support and Advice
- Etc.
- Resources, Skills and Motivation
18Applying that thinking towards real-world work
- What needs to get done
- and in what order?
19Applying that thinking towards real-world work
- How will you know if you have succeeded?
20Applying that thinking towards real-world work
Resources
Task Reason
Success?
Work Plan
21Appraising the Value of this Workshop
- Separate into small groups (3 or 4 people)
- By country
- By region
- By language
- By ?
22Appraising the Value of this Workshop
- In each group think about and answer the
following questions? - (More than one answer per question is Ok)
23Appraising the Value of this Workshop
- Thinking about this workshop
- What was the most valuable thing you learned?
- What new effort/project will you personally
start? - What one thing do you think will change as a
result of being here? - What will you reduce or stop doing?
- What do you now think is the most import
challenge for your network?
24Appraising the Value of this Workshop
- Again, thinking about the workshop
- What was missing?
- What did we do, that we should not have done?
- What should we do even more of?
25Appraising the Value of this Workshop
- Each group should report their responses.
- (max. 5 min for each group)
26Where do you go from here?
27Final Word
- Do not believe everything you think!