Secure System Solution and Security Technology
|
|
|
- Tyrone Lang
- 10 years ago
- Views:
Transcription
1 Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly spreading through society. Their corporate systems are widely applied to, for example, information sharing and information transfer via the Web, access to groupware and databases, support for decision-making by linking with data and processes on existing backbone systems, and customization services for data warehouses and customers which leads to business innovation. The expansion and development of network computing can only be achieved by implementing system and information security. This article describes a security framework suitable for the development of a distributed environment, the scope of connection over the network, methods of implementing a secure system solution considering system cost and usability suitable for the type of information transferred over the network, and security technology and products to implement these functions. INTRODUCTION APPLICATION of the technology of the, which was developed on a noncommercial network for use with academic and public information, has been rapidly expanding its scope of application to not only corporate systems (intranets) but also the intercorporate systems (extranets) and corporate-consumer systems (electronic commerce: EC) because of its openness on a global scale and excellent operability. It is expected that corporations, homes, and society as a whole will be connected together by a seamless network, and proper system services allowed for each type of user will be provided safely from anywhere on the network, resulting in the development of a highly information-oriented society. In order to implement this huge distributed environment, security technology aimed at protecting the system and information connected with the network is indispensable, and the importance of security is increasing in proportion to the expansion of the application and the scope of connection. Security technology based on cryptography has implemented system access control, data protection on the network, authentication of the other party in communication, assurance of communication authenticity, and prevention of communication disavowal. Hitachi proposes a totally secure system solution to support the development of the and intranets. SECURE SYSTEM FRAMEWORK An information system based on Protocol (IP) enables corporate information systems and public systems to develop extensively from a data sharing and data transmission infrastructure. Fig. 1 shows the entire configuration. A corporate information system (intranet) and SOHO mobile systems utilizing technology to allow the access from outside of the corporation must provide access control and data protection with a firewall, secure communications, and file encryption. An authentication is introduced into the system to implement more precise user authentication for the use of information or programs stored in the system. An extranet for intercorporate data transfer and business transactions requires public authentication (notarization) of an order or settlement (payment) and a more reliable and band-assured network infrastructure service. For advanced use of the, a secure commerce and an authentication center that assures secure network transactions for consumer electronic commerce are needed. Fig. 2 illustrates a security framework configuration to implement the above functions. The framework is provided with hardware incorporating encryption technology, the basis for security, such as an encryption router or an IC card.
2 Secure System Solution and Security Technology 246 Enterprise intranet and extranet system EC and public systems Office automation and groupware system Backbone system Web and database Intercorporate electronic commerce Certificate, Other corporate directory extranet Certificate issue and user control Access control and user authentication Firewall (Gauntlet)* 1 (Firewall-1)* 2 External WWW Japan Hitachi Commerce Solution Certificate Service Co. Bank or Virtual mall credit card company File encryption, electronic signature Cipher library Intranet (Secure communication library) Encryption router Encryption-based communication system Communication channel encryption Access VPN Browser Facsimile Public network Mobile or SOHO environment Telephone Cellular telephone, PHS Mobile, SOHO, Home (Consumer) Security (data protection, access control, authentication, and copyright protection) Prevention of data alteration, wiretapping, theft, destruction, masquerade, repudiation, and unauthorized access. WWW: world wide web EC: electronic commerce SOHO: small office, home office PHS: personal handyphone system VPN: virtual private network : encrypted communication *1 Gauntlet is a trademark of Network Associates, Inc., U.S.A. *2 Firewall-1 is a trademark of Check Point Software Technology Ltd. Fig. 1 Concept of Secure Intranet and Systems. Illustration of an overview of secure and intranet systems that connect corporations, homes, and society as a whole via a secure seamless global network is shown. Development of the network is supported by strong flexible security technology. Services and solutions Enterprise business media service Enterprise network outsourcing service Satellite information distribution service Hitachi Commerce Solution Certificate issuing service (Japan Certificate Service Co., Ltd.) Contents delivery service VPN Service Secure middleware Network management Certificate Secure Secure WWW Directory Secure commerce Firewalls Secure communication library Electronic signature Digital watermark Secure socket Cipher Private key cipher: MULTI2*1, DES Public key cipher: Elliptic curve cipher, RSA Hardware Encryption LSI IC card application system Digital receiving equipment for satellite broadcasts Encryption router : Hitachi s product VPN: virtual private network *1: MULTI2 is the original private key cipher algorithm and is registered to ISO. Fig. 2 Hitachi Security Framework. The entire hardware and software hierarchy for implementing a total security system suitable for the application or system configuration.
3 Hitachi Review Vol. 47 (1998), No The secure middleware includes an electronic signature using encryption technology, a secure protocol, a firewall, an authentication, and other application s to implement secure communications. System services and solutions are built on these functions. A secure system solution that meets the user s application can be configured by combining such services and solutions. An approach to configuring a secure system solution and remarkable security technologies and products will be described below. SECURE SYSTEM SOLUTION Security Policy The security policy defines the security assurance stance by clarifying and classifying what are the threats, against whom should protection be taken, what is the subject of protection, and what cost should be paid for security. Security policy planning is considered important for designing, introducing, and operating a security system. Even a single security hole could lower the security level of the entire distributed system. Discussed below are the secure system configuration created on the basis of the security policy and the concept of its procedures for creating the system. Functions for Implementing a Secure System The following functions are necessary to implement a secure system. (1) Network access control This function controls access to networks by distinguishing them as either inside or outside the or corporation network. Control is implemented by filtering such as packet-filtering through a firewall or a router. (2) Terminal control This function controls terminals, that is, restricts s or sections that can access the system and use the information stored in it. (3) Available application control This function controls the available applications for each user or department. It is also used for preventing persons from using applications that are not related to their jobs, for example, by restricting web page viewing or Telnet utilization. (4) User control This control feature identifies an authentic user. The user authentication capability can be strengthened by providing an electronic certificate in addition to the use of an identification (ID) number and a password. It is suitable for a job or business limited to specified users. Secure System Configuration and Security Measures To select security measures and cost, the system must be designed with consideration for cost effectiveness. It is important to provide appropriate measures at necessary points, and the required security level is determined by the types of data flowing over the network and the anticipated degree of damage or monetary loss due to wrongful use of the data. Fig. 3 outlines the secure system configuration and its security measures. (1) Configuration of a closed network within the This is a corporate LAN environment without connection to outside networks and is used only by users within an or corporation. The configuration of this network, which is not connected with any network external to the, will use authentication and access control setting at the and antivirus software as its basic security measures. Since illegal access within the is a major risk, the capability of strict user identification may be necessary. (2) Open data configuration to users within the This configuration provides an environment where the corporate system is connected with the by leased lines to use external services. This type of configuration needs to protect against illegal intrusion from the outside. Installation of a firewall or similar protection is essential at the interface with the external network, which is a particularly important point for security measures. (3) Data exchange configuration for users within the This configuration provides an environment where data exchange is performed within the via the. It includes SOHO and mobile access systems. The configuration requires measures against data interception on the. User authentication is essential for mobile access. (4) Data exchange configuration for outside users This extranet configuration allows data exchange with users external to the via the. It requires measures against communication data forging, user masquerade, and repudiation of once approved data. Examples of this type of configuration include electronic commerce (EC) between
4 Secure System Solution and Security Technology 248 Larger Availability range Password Access control Countermeasure against virus Closed network within Corporate LAN Firewall Log analysis Data open to users within Corporate LAN Firewall External information Secure communication Seamless VPN Data exchange for users within Corporate LAN Confidential information Corporate LAN Data exchange with users external to the Other party s transaction network Authentication bureau Transaction information Certificate Secure commerce Authentication bureau Inside enterprise network Smaller Lower Security level Higher Fig. 3 System Configurations and Security Measure Levels. System utilization configurations and security countermeasure levels can be broadly divided into four types. corporations and consumer EC over the. Procedures for System Integration of a Secure System A security solution is fundamentally based on the security policy. The security solution prescribes the standard procedures for designing a secure system by identifying access control setting information through definition of users and services for example, applications such as web access, , and file transfer and utilizing the setting information for actual installation. The procedures are described below. (1) Investigation of the design requirements Establish a security policy by extracting and sorting the service requirements to be satisfied and the restrictions. (2) Basic architecture design Design a basic network architecture and review the method of implementing the required services, always taking security into consideration. (3) Detailed architecture design Check security factors for providing services, and make necessary security reinforcement. (4) System evaluation Check the system periodically to see that it meets the established security policy. BASIC TECHNOLOGY SUPPORTING THE SECURE SYSTEM Discussed below is a basic security technology that supports the implementation of the secure system mentioned above. Basic Security Product Architecture Today s corporate information systems are created in the intranet environment placing emphasis on technology, and are also shifting to systems using distributed object technology. On the other hand, client- system configurations based on mainframes and UNIX s* also have been widely employed. Thus the entire system s security can be realized by providing security architecture and a repertory of products that can be applied to various types of system configurations. Hitachi has implemented security applications including: (1) a firewall to protect an entire corporate information system, (2) a virtual private network (VPN) to provide secured communications in the or mobile environment, and (3) a provision of precise security at each basic unit of transaction or service in the or an intranet environment (Fig. 4). *: UNIX is a registered trademark of X/Open Company Limited.
5 Hitachi Review Vol. 47 (1998), No Network Security Hitachi supports implementing basic site security by providing two kinds of firewall products, Gauntlet and FireWall-1, to prevent illegal access to the corporate information system from the outside. Virtual Private Network Hitachi offers a virtual private network (VPN) as a network to interconnect a firm s headquarters and branches instead of leased lines, for example, or as the infrastructure to implement the new work styles such as mobile operations, working at home, or SOHO environments. Hitachi provides two VPN products: VPN for Gauntlet, which can be added to the Gauntlet firewall, and secure socket system, which is applied to mobile access via the public network. Either product allows communications using highly secure MULTI2 cipher 2,3). Security of Distributed Object Environment Hitachi offers security service functions conforming to Common Object Request Broker Architecture (CORBA) Security 2.0 proposed by Object Management Group (OMG), as the security basis for the distributed object system environment created. The messages transferred between objects belonging to the security domain, which is controlled by the security, can all be encrypted by SECIOP, a secure protocol, and turned into signed messages. The access between those objects can be controlled, to establish a secure distributed environment. Also, a single log-in feature can be implemented for plural applications (objects) belonging to the security system domain. Application Security Application security means implementation of secure message exchange and file exchange between applications independent of the security of intervening networks or the configuration of distributed system environments. The secure exchange features are suitable for mission-critical activities because they can be implemented by using a secure communication library from an application, and can be applied precisely at any required level to data needing encryption or signing. These features will actively be applied to basic applications developed in the Enterprise system, government system, etc. Application /mainframe Network security operation platform Unified operation of security within a company Unified management of user information and authentication/ access control (directory and authentication ) Assuring security for basic application groups CORBA security Intermediate (e.g., Web ) Another corporation AP security (Including work flow and document control) Intranet Secure communication on the Preventing unauthorized accesses from the outside Preventing leakage or wiretapping of confidential information Assuring the confidentiality of order reception and placement activities Assuring the privacy of business and personal information Firewall AP security (including extranet and intercorporate EC) / mobile environments VPN between headquarters and branches (VPN for Gauntlet) Mobile user or work at home (Secure socket) Public services such as issuing certificates AP: application program Fig. 4 Secure Corporate Information System Environment Implemented by Hitachi. Provides security infrastructure to implement seamless application for interconnecting corporations or corporations and society as a whole. Security at various levels can be assured for different system configurations and business purposes.
6 Secure System Solution and Security Technology 250 or extranet environment, and to systems handling personnel, accounting, and financial settlement activities. Security Operation Basis The system provides common operation control based on the technology to allow common operation of various security functions to meet the users needs and system configurations and to minimize operation costs. A secure system is built up on the basis of X.509 public key digital certificate, which is widely employed in the environment. Hitachi provides a certificate issuing for the intranet or the extranet. Its operational load can be reduced by controlling the certificates issued and user s information with a directory conforming to Lightweight Directory Access Protocol (LDAP), which is defined by the Engineering Task Force (IETF). Security is strengthened by allowing an IC card to be used as a certificate storage medium, and by reducing the operation cost of the security system for the end-user through the implementation of a single log-in function. Encryption Technology Supporting the Security Functions Hitachi has developed a variety of security technologies and encryption technologies for security products since the 1980s. The MULTI2 cipher, a private key cipher system announced in 1989, is not only the common technical base for secure systems proposed by Hitachi but also employed widely for network devices and digital satellite broadcast systems. Hitachi also developed Hitachi elliptic curve cipher, a public key cipher system, announced it in July 1997, and shipped the product version, the first in Japan, in September It is expected to assure the security of new systems in our -based society systems, including electronic commerce in the future. CONCLUSIONS This article describes the secure system solution and security technology and products that will be the basis for the development of the secure and intranet systems. The authors propose total security solutions for more global and seamless network systems, aiming at the implementation and enrichment of corporate information sharing and transfer; corporate activity innovation by interconnection of distributed applications; media distribution infrastructure for homes; and distribution, finance, and administration network services in society as a whole. REFERENCES (1) Kawakami et al., Development of New Management and Information System in Cyberspace Age, Hitachi Hyoron 79, No. 5 (May 1997), pp , in Japanese. (2) Sasaki et al., Security Technology in the Open Network, Hitachi Hyoron, 79, No. 5(May 1997), pp , in Japanese. (3) Sasaki et al., Security. Ohm Co., Ltd. (1996). ABOUT THE AUTHORS Chisato Konno, D.Sc. Joined Hitachi, Ltd. in 1977 and now works at the Strategic Business Development Department of the Information Systems Business Planning Div. He is currently engaged in the planning and development of security related products. Mr, Konno is a member of the Information Processing Society of Japan, and Japan Society for Industrial and Applied Mathematics, and can be reached by at [email protected] Mitsuhiro Tsunoda Joined Hitachi, Ltd. in 1987 and now works at the Network Systems Department of the Information Systems Div. He is currently engaged in the development and sales of and intranet solution services. Mr. Tsunoda can be reached by e- mail at [email protected] Yasushi Kuba Joined Hitachi, Ltd. in 1988 and now works at the Planning Department of the Software Development Center. He is currently engaged in the planning and development of security-related and other products. Mr. Kuba can be reached by at [email protected] Satoru Tezuka Joined Hitachi, Ltd. in 1984 and now works at the Security Research Center of the Systems Development Laboratory. He is currently engaged in the research and development of security systems. Mr. Tezuka is a member of the Information Processing Society of Japan, and can be reached by at [email protected].
Total Security Solution System: @SECUREVISION Essential Security for Net Businesses
UDC 621.395.74:681.32.004.4 Total Security Solution System: @SECUREVISION Essential Security for Net Businesses VTakashi Ohgo (Manuscript received September 24, 2000) The numerous cases of cracking into
Total System Operations and Management for Network Computing Environment
Total System Operations and Management for Network Computing Environment Hitachi Review Vol. 47 (1998), No. 6 291 Satoshi Miyazaki, D. Eng. Toshiaki Hirata Masaaki Ohya Eiji Matsumura OVERVIEW: The architecture
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
GR2000: a Gigabit Router for a Guaranteed Network
Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Fujitsu s Approach to Cloud-related Information Security
Fujitsu s Approach to Cloud-related Information Security Masayuki Okuhara Takuya Suzuki Tetsuo Shiozaki Makoto Hattori Cloud computing opens up a variety of possibilities but at the same time it raises
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security
Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security
Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 [email protected] Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
The BiGuard SSL VPN Appliances
The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Intranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Fujitsu Enterprise Security Architecture
Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
IBM i Version 7.3. Security Digital Certificate Manager IBM
IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
Quidway SVN3000 Security Access Gateway
Quidway SVN3000 Security Access Gateway SSL/IPSec VPN Access Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview With the rapid development and popularization of the Internet, informatization of enterprise
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
UTMB INFORMATION RESOURCES PRACTICE STANDARD
IR Security Glossary Introduction Purpose Applicability Sensitive Digital Data Management Privacy Implications This abbreviated list provides explanations for typically used Information Resources (IR)
Fujitsu s Approach to Hybrid Cloud Systems
Fujitsu s Approach to Hybrid Cloud Systems Mikio Funahashi Shigeo Yoshikawa This paper introduces Fujitsu s approach to a hybrid cloud, which combines internal (on-premises) systems and services on public
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
ELECTRONIC COMMERCE SYSTEMS
CHAPTER ELECTRONIC COMMERCE SYSTEMS This chapter discusses one of the most visible segments of the business world today e-commerce. In general terms, the issues involve the electronic processing and transmission
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Secure Use of the New NHS Network (N3): Good Practice Guidelines
Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
MANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering
Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications
Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications What You Will Learn This whitepaper describes how to meet the Payment Card Industry Data Security Standard (PCI DSS) for
IDIS Product Security
(Mar.10.2015) 2014 IDIS Co., Ltd. All rights reserved. IDIS and identifying product names and numbers herein are registered trademarks of IDIS Co., Ltd. All non-idis brands and product names are trademarks
Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
Study on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With
Securing Network Print Jobs
White Paper - Levi, Ray & Shoup, Inc. Securing Network Print Jobs Enterprise Output Management Series LRS White Paper 2002 Levi, Ray & Shoup, Inc. All rights reserved. LRS, VPS, and are registered trademarks
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
CRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
