BroadSAFE Enhanced IP Phone Networks
|
|
|
- Neil Wells
- 10 years ago
- Views:
Transcription
1 White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005
2 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls over a computer network. VoIP converts telephone voice signals into a digital signal that travels over the Internet. Industry trends confirm that VoIP usage is rapidly increasing, and this elevates the level of security concerns associated with the technology. Deployment of IP-enabled devices on corporate and public networks has resulted in new challenges for network managers, particularly in the realm of security. Until recently, VoIP usage has primarily been enterprise-based where, in comparison to the public Internet, the number of users is small and the environment tightly controlled, therefore, security concerns have been limited. With the marked growth and developmental progress of VoIP on the public Internet, there is a correlative increase in risk for data traffic sniffing and device spoofing attacks. Even in the enterprise, the overriding corporate concern is the unauthorized use of the network by both outsiders and employees. 1 How do we keep the mailroom employee from accessing confidential voice mails belonging to the CEO? Unprotected networks are susceptible to audio capture (eavesdropping on phone calls), identity theft where a hacker may spoof SIP messages and IP addresses to emulate another client device, and Denial of Service (DoS) attacks such as packet/broadcast storms, worms, and viruses which render the network unusable. DoS attacks are especially problematic because the intrusion is characterized by an explicit attempt to prevent legitimate users of a service from using that service, and, depending on the nature of your enterprise, this can effectively disable your organization. How can we secure the endpoints on the network so that: Devices will only receive packets from authorized or trusted sources? Only authenticated users may communicate in the network? Communications between endpoints or between a server and an endpoint are private and the data integrity is maintained? The intent of this paper is to help the reader understand how the use of the BroadSAFE TM core embedded in the BCM1103 and BCM1104 IP phone chips provide the foundation for strong security in IP Phone networks. Page 2
3 Overview BroadSAFE TM Technology Overview BroadSAFE is a general term used to describe the security technology implemented across a wide variety of Broadcom products. There are currently five different BroadSAFE implementations available, with each providing distinct levels of security services. The BroadSAFE implementation used in both the BCM1103 and BCM1104 is named µhsm or micro Hardware Security Module. This paper is focused on the security capabilities of the µhsm and its application in the IP Phone Networking space. Broadcom developed the µhsm to address the emergent requirement for hardware protection of private keys, and the need to manage keys in a construct that can scale to satisfy the demands of very large organizations. Certificates (keys) form the basis for any secure protocol by providing the credentials of a particular device on the network. When these credentials are stored in software, they can be copied, modified or spoofed by a rogue device on your network, exposing the network to attacks. As secure protocols like certificate-based Extensible Authentication Protocol/ Transport Level Security (EAP-TLS) and TLS-based Session Initiation Protocol (SIP) messaging are adopted, IT managers can respond to the vulnerability associated with storing certificates in software, and the challenge of managing certificates across a large enterprise. Broadcom s µhsm addresses each of these requirements by providing a hardware key usage and storage environment as well as a secure endpoint that enables secure remote certificate management. Page 3
4 µhsm Core Every µhsm core contains a 16-bit RISC processor, One Time Programmable (OTP) memory, ROM, public key (RSA, DSA, DH) engines, a 3DES engine, HMAC-SHA-1 engine and a random number generator. These components enable the µhsm core to establish a security boundary outside of which keys are never exposed in the clear. Keys are delivered to the µhsm in an encrypted form and decrypted inside the secure boundary of the µhsm, where they can be used and managed. For more details on the µhsm core, please refer to the micro Hardware Security Module Design Specification (HSM-TI-10x-R) stored in your docsafe account. Initialization Each µhsm module includes a block of OTP memory used to store the values of two unique private keys that are examined when the µhsm is initialized: A 160-bit Digital Signature Algorithm (DSA) identity key A 256-bit DH device confidentiality key These two keys are hardened into the device and establish the foundation for trusted client device and secure no touch network management. Storing these keys in hardware provides manifold advantages over storing them in software. Software is accessible and fluid. It can be changed, copied, debugged, and inspected, leaving keys susceptible to key-finding attacks. The private keys stored in the µhsm however, are never exposed outside of the µhsm core not to Broadcom, not to the OEM, not to anyone. Only associated public keys can ever be dispatched from the µhsm core. Page 4
5 The OTP memory is programmed during final test at Broadcom. There is no need for in-field programming. Every BCM1103/BCM1104 is shipped with unique keys programmed and verified. These values are listed in Table 1. Table 1: BCM1103/BCM1104-Unique Keys Key Name Identity Key (Kdi) Confidentiality Key (Kdc) Device Configuration (Dcfg) Device Authorization (Dauth) Description The 160-bit private key of a DSA Key. The key pair is generated on-chip and the secret is burned into the OTP. The public value is discarded, but can be regenerated on request. The 256-bit private key of a 2048-bit Diffie-Hellman Key. The key pair is generated on-chip. The private key is burned into the OTP. The public value is discarded, but can be regenerated on request. Register bits can be mapped to blocks on the host chip to enable/disable features on the chip, and to configure µhsm behavior. The BCM1103/BCM1104 does not have the option of enabling/disabling features using this register. This value contains a hash of the public key of an entity that can change the device configuration bits. Since the device configuration bits are programmed in OTP, the bits aren t physically changed, but the value written by an authorized entity will override the Dcfg bits (This value is not used in either the BCM1103 or BCM1104). Accessing the µhsm All µhsm features are accessible through the BroadSAFE µhsm API provided by Broadcom. This API is included with the BCM1103/BCM1104 SDK. Included applications can replace existing software implementations of cryptographic functions with calls to the µhsm API. BroadSAFE µhsm API documentation is available using your docsafe account. Page 5
6 µhsm Security Features Designing a secure IP phone network using the BCM1103/BCM1104 device with embedded µhsm provides four distinct advantages: Public key engines inside the µhsm core can be accessed to offload public key operations by applications running on the host processor. This frees up the host processor for additional tasks, and may help eliminate any critical timing paths related to call setup. Two unique private keys programmed in OTP memory securely authenticate network devices. These keys are burned into each µhsm core during final testing. One key establishes identity and the other encrypts data that only the µhsm can decrypt. Device identity is established using one of these keys and the DSA. This identity key can be used with the client verification message in a TLS initialization session to sign a hash of all previous messages. The µhsm core provides a secure key storage and usage environment for private key operations. Designing around a µhsm enables secure, centralized key management. In addition to hardware key protection, the µhsm also contains logic to enforce key expiration, revocation, usage and other key-based policy decisions. As keys expire, or are revoked, new keys must be distributed to end devices in a secure manner. The µhsm provides a trusted end point where the management server, housing a complete Hardware Security Module, handles key generation, backup, key-based policy setting, and secure key distribution. All of these advantages are distinct and independent, and can be implemented using a phased approach. Cryptographic offload One of the easiest techniques that can be used to take advantage of BCM1103/BCM1104 µhsm functionality is to offload public key operations to the public key engine contained in the µhsm. These engines can be used by any application to offload computationally expensive operations from software. The µhsm block was designed to be a small footprint, low-gate-count design, so performance from these engines is not comparable to traditional hardware cryptographic accelerators. The ability to offload these operations to hardware frees up the host processor for other tasks. The public key engine can perform about 10 public key operations per second, and supports RSA, RSA-CRT, Diffie-Hellman, and DSA. µhsm offload capabilities can be accessed using the Broadcom µhsm software reference library. In addition to the crypto engines contained inside the µhsm block, the BCM1103/BCM1104 also houses integrated AES and SHA-1 engines capable of 10Mbps sustained throughput. The AES engine supports 128-, 192- and 256-bit encryption in CTR, CBC and ECB cipher modes. The SHA-1 engine supports both pure SHA-1 hash as well as HMAC-SHA-1. These blocks operate independently of the µhsm block and are used primarily for encrypting and authenticating real-time media streams. Page 6
7 Robust Hardware-Based Authentication Device identification lies at the heart of any security architecture. Once the identity of a device on the network has been compromised, a hacker can exploit that identity to access corporate networks and conduct transactions while posing as a valid network entity. If device credentials are duplicated on a corporate network, which is the fundamental problem with storing certificates in software, it would be easy to access sensitive information contained in voice mails or call logs. The µhsm enables you to store device credentials using dedicated hardware protection, thus ensuring that devices on your network are who they say they are. Using BroadSAFE With EAP-TLS One method to ensure that only authenticated devices exist on the network is by using the EAP-TLS protocol. The µhsm secures X.509 certificates used in EAP-TLS by storing the certificate on an IP phone, encrypted with a key that can only be decrypted inside the µhsm. During the manufacturing process, the µhsm is queried for a confidentiality key (Kdc). A manufacturer-provided certificate server generates a device certificate, formats the private key as part of a Discrete Logarithm Integrated Encryption Scheme (DLIES) message according to IEEE1363bis, and encrypts the message with Kdc. The certificate, along with the encrypted private key, is then installed in flash memory on the phone in a non-eap network environment. Page 7
8 When the phone is installed on the network, software transports the encrypted private key of the certificate into the µhsm. Once the key is decrypted and resident in the µhsm, that certificate now resides in a hardware-protected boundary and can be used for network access in EAP-TLS or other similar protocol (see Figure 1). Additional certificates enabling different features can then be installed on the phone once network access is authorized. generates Certificate Server Device Device NV Memory NV Memory Private- Value DLIES Private - Key Value DLIES Private Private - Key Key Value Value BCM1103 BCM1103 µhsm uhsm IP Phone Figure 1: Certificate Server Key Generation and Delivery Page 8
9 Alternate Authentication Strategies It is possible to create an authentication strategy using the µhsm s capability to sign challenge data from an authentication server. This is an option for applications where system cost is at a premium and client software must be minimized to reduce memory costs. Instead of implementing the TLS protocol on the client, an alternative authentication strategy can be employed (see Figure 2). IP Phone EEPROM Network Request Certificate Submit Device Certificate Authentication Server μhsm Public Key (K DI-PUB ) Signed by Manufacturer s Private key Verifies signature using the manufacturer public key. Establishes that the public key of this module K DI-PUB is certified by the manufacturer. BCM1103 μhsm signs challenge using private identity key (K DI-PRIV ) Send random challenge Send signed challenge Generates a challenge (unique random 160 bit number). Verifies signed challenge using certified public key (K DI-PUB ). Establishes that the BCM1103 contains the private key K DI-PRIV that corresponds to the certified public key K DI-PUB Figure 2: Alternate Authentication Strategy Using this approach, a certificate, signed by the OEM, is installed on the IP phone. During authentication, the phone is queried for the certificate that the authentication server uses to verify the OEM signature. The server then authenticates the phone by sending it a random challenge that is signed by the µhsm. The signature is verified using the public key in the certificate. There is a minimal amount of code required on the client end for this type of authentication. User Authentication In addition to hardware-based device authentication, the BCM1103/BCM1104 µhsm provides the capability to authorize a network user. A user can enter a PIN via the keypad or supply credentials via the smartcard. These entries are input directly to the µhsm on GPIO lines. The µhsm hashes the input data and signs it with an identity key. This information can then be sent to a remote access server for authentication. Page 9
10 Key Management and Usage Once a network device is securely identified, it must be configured and managed. An initial configuration typically involves installation of a device certificate and enrollment of the device on the network. If the device certificate has no expiration, then an enforceable method for updating the device certificate, and any subsequent certificates, must be in place. These certificates authorize access to company databases, grant toll privileges and restrictions, or indicate the status of security patches and virus definitions. It is critical that these certificates securely transfer to the VoIP phone, without burdening IT with having to physically visit each device in order to install updated certificates. µhsm enables hardware-based secure communications using a certificate server to install certificates across the enterprise from remote locations. Broadcom employs a light-weight, proprietary but open protocol for communications between a Key Management Server (KMS) and µhsm called Key Delivery Protocol (KDP). This is a simple client-server based protocol that wraps key material according to DLIES. A KMS contains a hardware security module. The HSM provides secure key management to generate the cryptographic keys used in certificates, set the capabilities and security limits of keys, implement key backup and recovery, prepare keys for storage, and perform key revocation and destruction. Once keys are generated inside the protected HSM boundary, the KMS can establish a secure link between itself and a particular µhsm client, and install the keys or certificates on the client device. KMS products from ncipher ship with support for the KDP protocol. For more information, please visit Secure Device Authentication at the Call Manager It is possible to transfer the authentication function into the call manager by adding a key management and cryptographic offload module. Broadcom provides a FIPS level 3 certifiable solution using the BCM5862 Security Processor with an embedded µhsm paired with a BCM5890 Secure Application Processor. Keys can be generated and managed inside the secure boundary of the BCM5890. For example, the BCM5890 can generate session keys and distribute them securely to client devices using KDP once call setup has completed. Cryptographic operations can be offloaded to the high-performance BCM5862, with keys moving in and out of the BCM5862 through a secure serial channel to the BCM5890. For more information, contact your Broadcom representative. Page 10
11 Conclusion The µhsm core embedded in the BCM1103/BCM1104 is a very flexible, hardwarebased policy engine that uses advanced security features not available in competing devices. These features can be accessed using a variety of methods: Cryptographic offload Hardware-based authentication User authentication Certificate management The secure authentication enabled by µhsm allows you to safeguard network assets, prevent potentially malicious devices from accessing your network, and enables "touch-free" management of µhsm secured endpoint devices. Since the majority of VoIP security concerns surface after VoIP has been deployed, designing with the BCM1103/BCM1104 µhsm core gives you a hardware-based security platform, in addition to best-of-class VOIP features, allowing you to provide advanced security solutions now and in the future. References 1 Trends and Spending Plans for Security Appliances: Are We Ready for VoIP? (Instat Report by Reed Electronics Group, August 2005) Page 11
12 Broadcom, the pulse logo, Connecting everything, the Connecting everything logo, BroadSAFE, BroadVoice and BroadVoice32 are trademarks of Broadcom Corporation and/or its affiliates in the United States, certain other countries and/or the EU. Any other trademarks or trade names mentioned are the property of their respective owners. Phone: Fax: Web: BROADCOM CORPORATION Alton Parkway, P.O. Box Irvine, California by BROADCOM CORPORATION. All rights reserved. BroadSAFE-WP100-R 09/23/05
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Sectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
How To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
EMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Application Security: Threats and Architecture
Application Security: Threats and Architecture Steven M. Bellovin [email protected] http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability
White Paper Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability The new TCP Chimney Offload Architecture from Microsoft enables offload of the TCP protocol
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity
Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
OMAP platform security features
SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
EMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
