Characteristic-Based Security Analysis of Personal Networks
|
|
|
- Joel Lane
- 10 years ago
- Views:
Transcription
1 Characteristic-Based Security Analysis of Personal Networks Andrew J. Paverd Department of Computer Science University of Oxford Fadi El-Moussa BT Research BT Technology, Service & Operations Ian Brown Oxford Internet Institute University of Oxford This research was conducted as part of the Future Home Networks and Services project at the University of Oxford, funded by BT. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. UbiComp 14, September , Seattle, WA, USA Copyright 2014 ACM /14/09... $ Abstract The Personal Network (PN) is a logical network of interconnected components used by an individual. It encompasses the home network, the Personal Area Network (PAN), and the Vehicular Area Network (VAN) and includes cloud-based services. Previous security analyses, including ITU-T Recommendation X.1111, have focussed on the individual physical networks rather than the PN itself. By consolidating and structuring previous work, we propose an updated and enhanced security analysis for the PN. In our characteristic-based approach we identify the primary characteristics of the PN and its components and use these to develop an abstract PN asset model. From this, we derive the main attacker objectives and a list of attack vectors through which these could be achieved. We propose a mapping between the attack vectors and the PN component characteristics that can be used to determine the specific attacks to which a particular component is vulnerable. In this paper, we present a summary of this analysis and discuss its usage. Author Keywords Attack vectors; characteristics; home; threat model ACM Classification Keywords K.6.5 [Management of computing and information systems]: Security and Protection.
2 Introduction The home environment is experiencing a rapid increase in smart, interconnected devices and systems ranging from smart appliances to building management systems. At the same time, smartphones and tablets are becoming ubiquitous user devices and an increasing number of systems are powered by cloud-based services. In a personal context (as opposed to an enterprise environment), concepts such as the home network, Personal Area Network (PAN) and Vehicular Area Network (VAN), have traditionally been used to represent the interconnection of devices and systems in a particular environment. The defining characteristic of these networks is that they are based on geographical locality and only include devices and systems in close physical proximity. However, it is becoming increasingly common for modern systems to transcend these physical network boundaries. Many in-home systems rely on cloud-based services and communicate with mobile devices outside the perimeter of the home network. For example, a Home Energy Management System (HEMS) could use a cloud service [5] and could be remotely controlled from the user s smartphone. This new paradigm is important from a security perspective, however most security analyses still focus on geographically-defined networks. For example, ITU-T Recommendation X.1111 Framework of security technologies for home network [3] presents a threat analysis for the geographically-defined home network. This overlooks the threats arising from mobile devices or cloud-based systems which are highly integrated with the home network even though they are outside the home. An alternative approach is to consider the Personal Network (PN) which Lyle et al. define as a set of communicating devices belonging to and/or used by a particular individual [7]. Niemegeers and De Groot envision the PN as a dynamic extension of the PAN to encompass the user s home network as well as other networks such as VANs [10][11]. They have also pointed out that the PN will only inspire trust and be accepted by its users when a sufficient level of security is guaranteed [11]. Similarly, Leung et al. have described the Personal Distributed Environment (PDE) as an overlay network consisting of the networked devices that the user owns or is authorized to use [6]. A recent example of the implementation of a PN is the webinos research project which spans the home, mobile and vehicular environments and also includes cloud-based functionality [17]. These definitions and examples illustrate that the PN is not a geographically-defined physical network but rather a logical set of interconnected devices and systems. To fill the gap left by other security analyses we have consolidated existing analyses and recent scientific literature in order to develop a security analysis for the PN. The full analysis is available as a technical report [13]. In this paper we present a summary of this report and discuss how this analysis can be used as a first step in mitigating security threats in the PN. Overview of the Security Analysis In this analysis we use the definition from Lyle et al. [7] and expand it to include cloud-based services. We refer to the devices and systems as PN components. Figure 1 presents the taxonomy used and shows the overall structure of this analysis. Based on previous descriptions of the PN, we have identified a set of fundamental characteristics of PN components. Each PN component will exhibit a subset of these characteristics based on its hardware and software capabilities. We have also defined a list of characteristics of the PN itself that distinguish it from other types of networks that have been investigated.
3 Characteristics of PN components [inform] [mapped to] Abstract asset model [basis of] Attacker motivation & objectives [realized through] Attack vectors Characteristics of the PN [inform] [enable] [based on] Figure 1: Overview of the security analysis. Based on these two sets of characteristics, we have developed an abstract asset model of a generic PN and have proposed a set of possible threats in the form of attacker objectives. The details of the asset model and the attacker objectives are presented in the technical report [13]. By consolidating previous security analyses, we have compiled a list of possible attack vectors for the PN. These attack vectors are based on the characteristics of the PN and its components. We have observed that certain attack vectors are only applicable to PN components that exhibit specific characteristics and we have used this to create a mapping between attacks and component characteristics. This mapping can be used to determine the set of attacks to which a particular type of device or system is vulnerable. This methodology differs Existing analyes and scientific literature from previous security analyses that attempt to divide all components into non-overlapping categories. We argue that our characteristic-based approach is better suited to the PN context due to the high degree of heterogeneity between the PN components as described in the next section. Our contributions are therefore: a structured consolidation and systematization of the attacks against the PN; an improved methodology for mapping these attacks to specific devices based on characteristics rather than categories; and a proposal for this mapping. Characteristics of PN Components Most threat analyses for the PN have used a category-based approach in which the components are divided into non-overlapping categories. In ITU-T Recommendation X.1111 [3], the devices in the home network are divided into three device types, each of which is vulnerable to a particular set of threats. The categorization does not facilitate any distinctions between devices in the same category. However, various research efforts have shown that improvements in PN functionality result in new potential threats. Some of these threats are not applicable to all devices in a single category whilst others are applicable to multiple categories. For example, mobile devices such as smartphones (X.1111 Type A) are significantly more vulnerable to unauthorized physical access due to theft compared to desktop PCs (also Type A) secured in the home. On the other hand, smartphones (Type A) and smart TVs (Type C) are both vulnerable to software exploits. Therefore we argue that our characteristic-based approach is better suited to the PN context because it captures a higher level of detail by allowing flexible combinations of characteristics. Achieving this in a category-based approach would require a large number of categories to represent all the possible combinations. We have identified the following
4 characteristics of PN components from recent scientific literature as well as ITU-T X.1111 [3] and the NIST Guidelines on Cell Phone and PDA Security [9]: Persistent Storage: Does the component provide persistent storage capacity? This characteristic encompasses storage of any type of data in the PN. Processing Functionality: Does the component process any information or data? This characteristic is applicable to the majority of devices since it refers to any form of transformation or processing of data or information. Communication Capabilities: Does the component transmit or receive data? By definition, this characteristic is applicable to all components of the PN since they communicate with each other or with external entities. This includes components that facilitate network communication such as the home network gateway. User Interface (UI) Capabilities: Does the component provide a local UI? This characteristic includes all forms of user input or output that take place via a local UI on the component. This UI must not require any other component to achieve full functionality. For example, many smart home appliances can only be accessed via a web interface, thus providing remote accessibility but not a local UI. The component on which the user accesses this web interface provides its own local UI. Direct Control of External Physical Infrastructure: Does the component directly control or influence some external physical infrastructure? This characteristic refers to physical infrastructure that is not related to the computational functionality of the component. Direct control means that there are no intermediate systems between this component and the physical infrastructure. Physical Mobility: Is the component designed to be mobile or portable? A portable component is designed such that it can easily be moved to a new geographical location and resume operation. A mobile component is portable and also remains fully functional whilst moving. Support for Third Party Software: Is the component capable of running software provided by a third party that was not part of the original software environment? This characteristic is generally used to distinguish between smart and non-smart devices. Control of Other Components: Does the component have the capability to control other components in the PN? In this characteristic, control refers to any ability to affect, modify or influence the behaviour or state of another component. Remote Accessibility: Can the component be accessed or controlled by a remote entity? This refers to any remote access, control or UI capability that does not take place via the component s local UI. Provision of Services: Does the component provide services to other components in the PN or to external entities? This characteristic encompasses all types of services that provide value in the PN (e.g. any service that would have a negative impact on the PN if it becomes unavailable). Consumption of Services: Does the component consume services provided by other components in the PN or external entities? This is applicable to all components that consume any type of service provided by another component or by an external entity.
5 Characteristics of the Personal Network Although there is significant diversity between PN implementations, certain common characteristics are beginning to emerge. The following characteristics are important from a security perspective: Absence of geographical locality [10][11][7]: Since the PN is not defined in terms of geographical locality, it must always be assumed that PN components might be in different areas. Although this does not affect the connectivity between devices, it means that this connectivity could be provided by third party networks. It also means that a device s location now represents a richer source of contextual information about the user (e.g. location-based services on the user s smartphone). Device heterogeneity [3][12][9]: As described in ITU-T X.1111, the home network exhibits a high degree of device heterogeneity. As this is expanded to the PN, an even greater diversity of devices must be considered. The capabilities that could vary between devices include computational architecture and processing speed, data storage technology and capacity, communications capabilities, mobility, software and UI capabilities. Communication diversity [3][10][15]: The PN also exhibits a high degree of communication heterogeneity since it utilizes a combination of communication technologies based on different communication channels and protocols. The PN could involve a combination of unicast, multicast and broadcast communication services. Shared Components [10][7]: Since the PN is a user-centric construct, an individual s PN could include devices and/or communication infrastructure that are shared between multiple users. For example, smart home appliances could be shared between the residents or multiple applications could use the same cloud-based service. Depending on the system, users might be identified either as a group or individually. The identities of other users of the service may or may not be known. The identity model has an impact on the nature of the trust relationships between the users and is therefore important in defining the usage policy for shared devices. Multihomed network topology [3]: A modern PN could have multiple connections to external networks such as the Internet. For example, home Internet connectivity is normally provided by the home gateway but most smartphones have the ability to share their mobile broadband connections with other devices (e.g. Wi-Fi tethering). Although not explicitly stated, this characteristic is implied in the ITU-T X.1111 model [3]. Dynamic nature [15]: The PN is dynamic in terms of the devices that are connected at any point in time and the communication links in use. Some services are provided and consumed in an on-demand manner, particularly those hosted in the cloud or provided by battery-powered devices. Furthermore, some devices might periodically leave and rejoin the PN or switch to a different type of communication network (e.g. a smartphone moving from home Wi-Fi to a public mobile network). Energy-aware systems [14]: PN components are becoming increasingly aware of their energy use and are beginning to dynamically adapt their operation to minimize consumption or use energy at a more economical time. For example, in the smart energy grid, home devices and appliances dynamically change their behaviour based on the prevailing cost of electricity. Due to battery limitations, mobile devices are also becoming more energy aware and technologies such as mobile cloud computing are being developed to improve energy efficiency [14].
6 Attack Vectors of the PN This section presents the primary attack vectors that are applicable to the PN. The references next to each heading indicate which analyses or publications include the attack. Only a subset of these attacks are included in ITU-T X.1111 [3] (those not included are indicated with an *): Malicious Software * [1][4][7][8][9]: Malware can be defined as any undesirable software running on a device without the user s consent. This is arguably one of the most common attacks against end devices but could also be used for attacks on the network infrastructure. Malicious Hardware * [16]: Malicious hardware is a much less common threat than the software equivalent but still represents a possible attack against the PN. Malicious hardware refers to any hardware component that has been introduced into the PN for malicious purposes. Exploitation of Flawed/Incorrectly Implemented Software * [8]: Another direct mechanism for achieving the attacker s objectives is the exploitation of design or implementation flaws in legitimate software in order to steal information, gain access or affect availability. Exploitation of Flawed/Incorrectly Implemented Hardware * [16]: Similarly, it might be possible to exploit vulnerabilities in physical hardware systems in an attempt to steal information, gain access or affect availability. Eavesdropping/Interception of Communication [1][2][3][4]: This is a common class of attack on networked systems, particularly those using wireless networks such as the PN. Interruption of Communication [3][16]: Another potential attack on networked systems is interruption of communication which affects the availability of information and services and could be used to mount a denial of service attack in the PN. Modification of Communication [3]: Modification of communication represents a class of attacks in which an attacker attempts to intercept communication messages, modify them and forward them to the intended recipient, whilst attempting to avoid detection. Impersonation of Communicating Entity [3]: In a PN consisting of multiple communicating entities, another possible threat is the impersonation of one of these entities. If successful, the attacker gains the capabilities and permissions normally held by the impersonated device. Unauthorized Remote Access [3][7][9]: For components that permit remote access, unauthorized use of this functionality could provide the attacker with access to all functionality available to a legitimate remote user. Unauthorized Physical Access [3][7]: Unauthorized physical access to PN components is an attack vector that could be facilitated by various mechanisms including theft of a mobile device or misuse of a shared device. Misuse of Device Interoperability * [7]: Lyle et al. argue that since security is a weakest-link problem, the least secure device in the PN could be used as a gateway to the rest of the network [7]. The increased replication of data between PN devices could also increase the probability of a data breach. Exploitation of Flawed/Incorrectly Implemented Protocols * [1]: This threat includes various types of protocols especially those used for communication, authentication or access control.
7 Eavesdropping on User Interface [3]: An attacker could eavesdrop on the information transferred over a local UI. Examples include shoulder-surfing or entering login credentials on a shared device in view of other users. Modification of Communication Routing [1][3]: An attacker could influence or modify the flow of information within the PN (e.g. modifying the routing configuration of the home gateway). Mapping Attacks to Characteristics As indicated in the previous section, certain attack vectors are only applicable to PN components that exhibit specific characteristics. By analysing each of the attack vectors, we have developed a mapping between specific attacks and characteristics of the PN components. This mapping is presented as a matrix in the technical report [13]. Using the Security Analysis In this section we present a scenario illustrating the use of this analysis to assess the possible attack vectors for two PN systems commonly found in the home: a tablet PC and a home energy management system (HEMS). The first step is to identify the characteristics of each device. Both provide non-volatile storage, processing and communication. The HEMS usually does not have a local UI but provides remote accessibility (e.g. via a web interface). It has direct control of external physical infrastructure (e.g. controlling smart appliances), and provides services (e.g. energy management). In contrast, the tablet has local UI capabilities, physical mobility and support for third party software, It can control other components and consume services (although in this example, it is assumed not to provide any services). The mapping described in the previous section can be used to determine the primary attack vectors for each device. In addition to the attacks common to both devices, the tablet s mobility makes it more vulnerable to unauthorized physical access (especially if it is a shared device), whilst the HEMS is vulnerable to unauthorized remote access due to its remote accessibility. The tablet is vulnerable to eavesdropping on its local UI and is more vulnerable to malicious software because of its support for third party software. However, both are still vulnerable to software exploits. In terms of the defined characteristics, these two devices are relatively similar but are clearly vulnerable to different attack vectors. More striking differences can be observed by contrasting embedded devices (e.g. wireless sensor nodes) with full-featured devices. Overall, it is anticipated that this analysis will have two primary use cases. The first is the assessment of existing PN implementations in order to determine the primary attack vectors and improve security by deploying appropriate defences or mitigation strategies. The second is in the design of new PN components and technologies. By identifying the primary attack vectors based on the component s characteristics, the relevant mitigation strategies can be included in the design phase. Conclusion and Future Work Various security analyses have focussed on specific devices or geographically-defined networks but few have considered the emerging paradigm of the Personal Network (PN). We have consolidated and systematized previous work into a comprehensive security analysis of the PN. In particular, our work enhances the framework of security technologies presented in ITU-T X Our characteristic-based approach makes it possible to associate specific characteristics with each PN component and thus identify the set of possible attack vectors for that component. Compared to the category-based methodology used in ITU-T X.1111, our approach
8 captures more detail and is therefore better suited to the high degree of heterogeneity in the PN context. Based on recent research, our analysis also includes new attack vectors in addition to those addressed in ITU-T X We suggest that this analysis can form the basis for future work towards mitigating the identified threats and thus enhancing the security of the Personal Network. References [1] Baugher, M., and Lortz, V. Home-network threats and access controls. In Proceedings of the 4th international conference on Trust and trustworthy computing - TRUST 11 (June 2011), [2] Friedman, J., and Hoffman, D. V. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information-Knowledge-Systems Management 7, 1, 2 (2008), [3] International Telecommunication Union. ITU-T Recommendation X Framework of security technologies for home network. Tech. rep., International Telecommunication Union, [4] Landman, M. Managing smart phone security risks. In Information Security Curriculum Development Conference (Oct. 2010). [5] Lee, J. I., Choi, C.-S., Park, W.-K., Han, J.-S., and Lee, I.-W. A study on the use cases of the smart grid home energy management system. In ICTC 2011, IEEE (Sept. 2011), [6] Leung, A., Yau, P.-w., and Mitchell, C. J. Using Trusted Computing to Secure Mobile Ubiquitous Environments. Security and Privacy in Wireless and Mobile Networking (2009), [7] Lyle, J., Paverd, A., King-Lacroix, J., Atzeni, A., Virji, H., Flechais, I., and Faily, S. Personal PKI for the smart device era. In 9th European PKI Workshop: Research and Applications (2012). [8] Miller, C. Mobile Attacks and Defense. IEEE Security & Privacy Magazine 9, 4 (July 2011), [9] National Institute of Standards and Technology (NIST). SP Guidelines on Cell Phone and PDA Security. Tech. rep., [10] Niemegeers, I. G., and de Groot, S. M. From Personal Area Networks to Personal Networks: A User Oriented Approach. Wireless Personal Communications 22, 2 (2002), [11] Niemegeers, I. G., and de Groot, S. M. Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications 26, 2-3 (2003). [12] Oberheide, J., and Jahanian, F. When mobile is harder than fixed (and vice versa). In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (Feb. 2010). [13] Paverd, A., El-Moussa, F., and Brown, I. Characteristic-Based Security Analysis for the Personal Network. Tech. rep., [14] Paverd, A. J., Inggs, M. R., and Winberg, S. L. Towards a Framework for Enhanced Mobile Computing Using Cloud Resources. In Proceedings of the Southern Africa Telecommunications, Networks and Applications Conference (2011). [15] Schwiderski-Grosche, S., Tomlinson, A., and Irvine, J. Security challenges in the personal distributed environment. In IEEE 60th Vehicular Technology Conference, vol. 5, IEEE (2004). [16] Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., and Glezer, C. Google Android: A Comprehensive Security Assessment. IEEE Security & Privacy Magazine 8, 2 (Mar. 2010), [17] Webinos. Phase 1 - Architecture and Components. Tech. rep.,
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Security Requirements for Wireless Local Area Networks
Information Technology Security Guidance Security Requirements for Wireless Local Area Networks Overview ITSG-41 March 2013 Foreword The ITSG-41 Security Requirements for Wireless Local Area Networks document
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Requirements & Reference Models for ADSL Access Networks: The SNAG Document
Technical Report TR-010 Requirements & Reference Models for ADSL Access Networks: The SNAG Document June 1998 Abstract: This document outlines architectural requirements and reference models for ADSL services
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Diagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements,
Diagram of Security Marek Vysoký Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Letná 9, 042 00 Košice, Slovakia [email protected]
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Understanding Cyber Defense A Systems Architecture Approach
NDIA 12th Annual Systems Engineering Conference, San Diego, CA, 26-29 Oct 2009 Understanding Cyber Defense A Systems Architecture Approach Tom McDermott Director of Research Georgia Tech Research Institute
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Overview of the Internet of things
Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
Securing Smart City Platforms IoT, M2M, Cloud and Big Data
SESSION ID: SSC-W10 Securing Smart City Platforms IoT, M2M, Cloud and Big Data Ibrahim Al Mallouhi Vice President - Operations Emirates Integrated Telecommunication Company (du) Roshan Daluwakgoda Senior
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Huawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
Information Security Team
Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK GEARING THE RESOURCE POOR MOBILE DEVICES INTO RESOURCEFULL BY USING THE MOBILE
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Mobile Device Security and Audit
Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP [email protected] Session Objectives Define mobile devices
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
UTMB INFORMATION RESOURCES PRACTICE STANDARD
IR Security Glossary Introduction Purpose Applicability Sensitive Digital Data Management Privacy Implications This abbreviated list provides explanations for typically used Information Resources (IR)
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Securing the mobile enterprise with IBM Security solutions
Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
MTP. MTP AirWatch Integration Guide. Release 1.0
MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
INFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems IAG U/OO/814639-15 13 October
