Recommended Best Practices for the Design of Secure Multi-Domain KVM and Video Routing Systems
|
|
|
- Kimberly Chandler
- 9 years ago
- Views:
Transcription
1 Recommended Best Practices for the Design of Secure Multi-Domain KVM and Video Routing Systems A Whitepaper from the Thinklogical Design Center
2 Table of Contents Executive Summary...3 The Challenge: The Threat...4 Introduction to KVM and Video Routing Systems...5 Recommended Best Practices for Secure KVM and Video Routing Systems...6 Physical Separation...6 Eavesdropping...7 Management & Control...7 Security Monitoring...8 Resiliency...8 Secure KVM and Video Routing Systems from Thinklogical...8 Physical Separation...9 Fiber Optics...9 Partitioning...9 Restriction...9 Monitoring...9 Resiliency...9 Accreditation...10 Summary...12 About the Thinklogical Design Center The Thinklogical Design Center (TLDC) is an invaluable resource available to our customers and partners. Led by two industry pioneers and co-founders of Thinklogical, David Cheever and Peter Henderson, the center has worked with customers and partners to provide thousands of conceptual system designs for requirements that range from the straightforward to the extremely innovative and complex. Backed by a staff of tenured, industry-specific application and development engineers, the center helps customers and partners discern their needs and requirements, and then develop the appropriate system design. Often, features and functions are utilized in the design that the customer or partner had not previously considered. Sometimes, features or functions are customized or even created during the design discussion, utilizing Thinklogical s rapid development capability. Typically, an initial TLDC consultation is a phone call lasting an hour or less. Initial system designs are usually completed within 24 hours. All TLDC services and consultations are complimentary. To contact the TLDC, please call , or [email protected] 2
3 Executive Summary In most cases, an organization s KVM and Video Routing systems are considered mission or business critical. These systems are typically deployed in areas that are core to the mission or business operation. They usually provide highly sensitive or very important content to users who are driving key organizational processes and making mission critical decisions. This is true whether the content is military intelligence, post-production video and audio, energy production control data, or video and audio from a live event, to name just a few examples. For these reasons, the security characteristics of KVM and Video Routing systems are of paramount concern. This whitepaper reviews the industry s current understanding of the security threat, and then explores best practices for designing KVM or Video Routing systems to ensure the security of the content, as well as the operation of the system itself. Five key design criteria are recommended: 1. The system architecture should physically secure and separate the target of the attack (content or system operation) from the threat: people. 2. The technologies used in the system should eliminate the ability to attack from a distance; that is, sniff or eavesdrop on the system. 3. The system should allow the administrator to closely manage and control access in accordance with the organization s security policies. 4. The system should automatically and continuously monitor for and identify breaches. 5. The system should be resilient; that is, it should be designed to not only withstand an attack, but also recover quickly following one. 3
4 The Threat For more than a decade, surveys to determine IT executive s priorities have identified securing an organization s content and systems as the top concern. This is true for both commercial and government/military organizations. In response, innovative new technologies have been introduced to address the security concerns. A key driver of innovation in security technology is the ever-increasing understanding of the threat itself. For instance, there is now a broad awareness that the threat can come from employees and contractors as well as external entities. This was, of course, the case with the recent US military and diplomatic exposure through Wikileaks. While studies draw various conclusions as to which group represents the greatest threat, it is clear from all findings that both groups are cause for concern. Industry understanding has also moved beyond the simpler notion that all threats to the security of content and systems are malicious. It is now clear that loss of data, corruption of data, or user actions that may cause the system to fail can be entirely accidental mishaps by an otherwise well-meaning employee or contractor, yet still carry the same deleterious effect as the malicious action. In addition, the various intents of a malicious attack have come into clearer view. Illicit or illegal acquisition of data has always been understood as a purpose for an attack. But equally important and increasingly frequent is the intentional disruption of mission/business critical systems with the intent of crippling the effective operations of businesses and government organizations. Finally, an important aspect of any attack is whether the attacker is physically present, or limited to remote access. Perhaps the security threat is best summarized with two simple observations: First, the focus of an attack is either to steal content, disrupt the operation of the system or both. Second, the attacker is always a person who has gained some immediate or remote access to the system. These statements may seem oversimplified, but as we shall see in our discussion below, together they form the underlying principles in the development of a secure design. A robust system design first seeks to physically separate the threat from the target of the threat; that is, the people from the content. Second, a robust system design will provide the tools necessary to closely manage and control the interaction of authorized users with the system. The focus of an attack is either to steal content, disrupt the operation of the system, or both... The attacker is always a person who has gained some immediate or remote access to the system. A robust system design first seeks to physically separate the threat from the target of the threat; that is, the people from the content. 4
5 Introduction to KVM and Video Routing Systems At a high level, a KVM or Video Routing system is the system, comprised of transmitters, receivers and routers (matrix switches), required to switch users between multiple sources and multiple destinations, using one set of user interface peripherals, such as a keyboard, video displays and a mouse. Some common application environments for KVM or Video Routing systems include command and control centers, post-production editing suites, scientific modeling and simulation centers, or content analysis and distribution operations. The difference between a KVM system and a local area network (LAN) is that the user, with one set of peripherals, requires access to several sources (servers, computers, databases, etc.), and they desire to switch between those sources and several destinations, which might include the display in front of them, a video wall, a DVD burner, etc. A LAN connects one user s computer to other users computers or servers; a KVM system connects one user s peripheral devices to multiple computers, servers, displays, etc. that are user-independant. When multiple users need to access multiple sources and be able to connect to multiple destinations, a router (matrix switch) must be included in the system. Since video content is by far the largest constraint in the design of this router, the router is often called a Video Router (video content, compared to data and audio, utilizes most of the bandwidth). Simple KVM and Video Routing System Example 5
6 Recommended Best Practices for Secure KVM and Video Routing Systems Approaches to countering a security threat can be broadly grouped into five categories: 1. The system architecture should physically secure and separate the target of the attack (content or system operation) from the threat: people. 2. The technologies used in the system should eliminate the ability to attack from a distance; that is, sniff or eavesdrop on the system. 3. The system should allow the administrator to closely manage and control access in accordance with the organization s security policies. 4. The system should automatically and continuously monitor for and identify breaches. 5. The system should be resilient; that is, it should be designed to not only withstand an attack, but recover quickly following one. Physical Separation The objective of physical separation is to prevent the threat (people) from physically accessing the content or the system. A common approach is to prevent unauthorized users from entering the physical location of the system, by restricting access through card readers, biometric readers, etc. This is a well-understood, sound and common practice for mitigating the potential threat from unauthorized users and external attackers. But today s technologies allow for mitigation of internal attacks as well, through the physical separation of the threat (people) and the system: a robust KVM extension system provides high performance and secure access to the content for authorized users, without providing direct physical access to the hardware that hosts the content. With these systems, the source hardware can be located in a separate room, on a different floor, in a different building or even in a different town, effectively separating the threat (people) from the target of an attack (the content). Separating users from computers can significantly reduce the threat that content and their attached networks will be perpetrated. 6
7 Fiber Optics are inherently and dramatically less vulnerable to eavesdropping attacks. Limit user access to content and the system by limiting the number and functionality of peripheral ports. Partitioning allows for isolation of resources within a router. Essentially, partitioning creates several isolated routers within a router. Restriction limits access to sources on a user-by-user, source-by-source basis. Eavesdropping An important aspect of preventing the theft of content is the prevention of eavesdropping. In this scenario, a perpetrator would gain access to the system using advanced technologies to intercept content through electrical, magnetic or acoustic emanations from the system. These are commonly termed compromising emanations. With the right eavesdropping equipment, the perpetrator may be able to intercept these emanations from hundreds of meters away. The most common system component identified as a culprit in the release of emanations is the wiring or cabling. In particular, copper cabling (twisted pair, coaxial, etc.) is a frequent target, as it produces significant emanations. Minimizing copper connections is a best practice. System designers concerned about security avert this threat by using optical fiber whenever possible. Optical fiber does not produce compromising emanations. A perpetrator must physically tap into an optical fiber to steal content. Obviously this requires complete physical access. And often, the system can alert the system manager when a fiber has been tapped. In net, fiber optic systems are inherently and dramatically less vulnerable to eavesdropping attacks. Management & Control Even with the source hardware separated from the users, authorized users will still be interacting with the system. This interaction provides another opportunity for security breaches. Therefore, a robust KVM system design will provide for close management and control of authorized user interaction with the system. A first practical step to managing authorized users, is to limit their ability to copy content or inject malware using devices such as flash drives or other portable or concealable media. A good example of this approach is the management and restriction of USB ports whenever possible. In a secure KVM system, these ports will be limited in their functionality to the connection of Human Interface Devices (HID), or peripherals such as keyboard, mouse, controllers, etc. The ability to copy or inject content through a USB port will be functionally disabled. Peripherals that use USB 2.0 present a particular problem. In these cases, it is not possible to limit the functionality of the port. Therefore, it is recommended that USB 2.0 ports only be used when there is no alternative. A second focus is to ensure that authorized users only gain access to those parts of the system they are authorized to access. Sophisticated management techniques, most often deployed through software and firmware, are required to ensure the highest levels of compliance and lowest levels of intentional or unintentional violations of access rules. For instance, KVM systems are often designed to access multiple sources across multiple networks with different security classification levels. A good example is the frequent requirement to operate Red and Black networks in a single military intelligence system (A Red network contains classified information in plain text, whereas a Black network contains classified information in an encrypted format, and/or non-classified information.) It is critical that a breach does not occur between these two networks, even though they may exist as part of the same KVM infrastructure. Typically, there are two design approaches to manage issues like these: partitioning and restriction. Partitioning refers to the ability to dedicate resources within the system to isolated groups, with no chance of unintentional crossover, within a router, switch or system of routers and switches. Essentially, partitioning creates several routers within a router. Restriction addresses the idea of limiting access on a user-by-user, source-by-source basis. A strong KVM system design will allow the system manager to determine which users gain access to which sources, and perhaps more importantly, which users are denied access to which sources. A strong technological approach to partitioning and restriction will minimize unintentional and intentional breach of the structure. 7
8 Security Monitoring A secure KVM system design must include the ability to continuously monitor the system. The system should be capable of identifying breaches and attempted breaches, keeping records of breaches and attempted breaches, and providing information to help determine the nature of the breach and how it might be prevented in the future. Resiliency The final component of a secure KVM system design is resiliency, or the ability to recover should a breach occur. Clearly, mission critical systems must provide for redundancy at the component level, through functionality such as redundant power supplies and hot-swappable components. But a secure KVM system should also provide for automatic failover at the system level. If an intentional disruption of the system occurs, it should have the ability to immediately and automatically re-establish operation in a parallel system. Secure KVM and Video Routing Systems from Thinklogical At Thinklogical, secure KVM and video routing and extension is one of our top priorities for innovation and development. As such, we have been very successful in introducing systems that meet the most rigorous security and information assurance standards. We have provided hundreds of systems to users in the most secure markets in the world, such as the US Military and Intelligence Community, several European Ministries of Defense and NATO. These customers, many of whom have the most demanding security requirements in their industries, have chosen Thinklogical for several reasons: Thinklogical systems can be designed to achieve, over significant distances if necessary, separation of the threat (people) from the target of the threat (the content) Thinklogical systems are fiber optic based, significantly reducing the opportunity for eavesdropping Thinklogical provides a robust and flexible suite of advanced security features and functions that allow for close management of user interaction in multi-domain environments to prevent attacks, and the resiliency necessary to withstand an attack Thinklogical provides the functionality required to allow for continuous monitoring of the system Thinklogical offers the highest performance in the industry, with 6.25 Gbps of bandwidth per thread, in a scalable, protocol-agnostic, completely non-blocking switching matrix. As a result, Thinklogical equipment transports every resolution of computer or broadcast video available today, with no compression, lost frames or artifacts. And perhaps most importantly, because of these differentiators, Thinklogical has achieved the unique status of being accredited to The Common Criteria, Evaluation Assurance Level 4 and TEMPEST standards. We believe we are the only fiber optic based KVM and Video routing systems to have achieved these accreditations. 8
9 Design Concept Physical Separation Fiber Optics Thinklogical Approach & Benefits Separate the threat (people) from the target of the attack Sources (servers, computers) can be separated from destinations (keyboard, mouse, video wall, etc) by as much as 1,000 meters using multimode fiber or 40 kilometers when using single mode fiber Realize additional benefits such as space management, flexibility and reduced noise and heat in the user area All Thinklogical products are designed specifically for use with fiber optics, making them inherently and dramatically less vulnerable to eavesdropping attacks Realize additional benefits such as additional safety, longer distances and less conduit space Partitioning Create as many partitions as there are ports in the router Thinklogical s partitioning is achieved in firmware, not software. A perpetrator would need to gain physical access to the router to launch an attack that included violating the partitions and even then, the router would need to be rebooted for the changes to take effect. Please see Charts 1 and 2 for more detail. Restriction Monitoring Resiliency Restrict on a port by port basis Thinklogical s restriction is achieved in firmware, not software. A perpetrator would need to gain physical access to the router to launch an attack that included violating the restriction scheme and even then, the router would need to be rebooted for the changes to take effect. Please see Chart 3 for more detail. Use Thinklogical s industry standard traps and alarms to create robust monitoring systems Configure a parallel redundant system with two, synchronized Thinklogical routers running in parallel (mirroring with identical signals). Thinklogical s unique switchover capability allows the system to automatically choose a stream to lock onto and then automatically failover to the parallel stream if necessary. Complete redundant, hot-swappable components such as power supplies and input/output cards. 9
10 Accreditation Perhaps the most significant testimony to the security benefits of Thinklogical systems is our achievement of accreditation according the The Common Criteria and our approval under TEMPEST standards. Thinklogical routers are the only fiber optic KVM and Video routers in the world that have achieved both of these accreditations. This has led to their deployment in secure facilities throughout the world. The Common Criteria is a framework available to customers with high security requirements, to specify those requirements so that testing laboratories can create evaluation criteria and testing procedures for vendors who want to achieve accreditation against the customer s requirements. EAL, or Evaluation Assurance Level is the level to which the product or system was tested and successfully passed. EAL 4 is the highest level that can be achieved based on the technical merits of the system. Thinklogical s KVM and Video routers are the only fiber optic KVM and Video routers in the world to have been tested and accredited to The Common Criteria. In Thinklogical s case, our routers were tested to The Common Criteria and accredited to Evaluation Assurance Level 4. This is a truly unique achievement in the industry one that is relevant to any customer with security as a key requirement for their KVM or Video routing system. In addition, Thinklogical s KVM and Video routers have been accredited to TEMPEST SDIP 27, Level B. TEMPEST is a framework that organizations use to judge the appropriateness of a product or system for use within a high security application, with specific focus on compromising emanations (electric, magnetic or audio). There are three levels of TEMPEST testing (A, B and C), defined by the distance a perpetrator would need to achieve to intercept signals from the system. Level A assumes the perpetrator has immediate access to the equipment. Level B assumes a distance of 20m and Level C, 100m. Thinklogical KVM and Video routers have been approved to Level B, meaning that a perpetrator cannot eavesdrop content through compromising emanations at a distance of 20 meters or more. 10
11 Chart 1: A Simple Partitioning Schema for a Thinklogical VX 80 KVM and Video Router In this diagram ports 1 through 20 (Partition 1) are dedicated to Black Network 1, ports 21 to 40 (Partition 2) to Black Network 2 and so on. As such, sources using ports 1 through 20 can only communicate with destinations using ports 1 through 20 and vice versa. A source or destination in Black Network 1 cannot communicate, intentionally or unintentionally, with any port in Black Network 2 or either of the Red Networks. Since Thinklogical implements partitioning in firmware, a perpetrator would need to gain physical access to the router to launch an attack that includes violating this structure. Chart 2: An Overlapping Partitioning Schema In this scenario, the partitioning structure is implemented to allow for overlapping partitions. Ports 1 through 4 in Partition 2 are completely isolated. But ports 5 through 10 are accessible in both Partition 2 and Partition 3. 11
12 Chart 3: Restricted Switching Priority Scheme An Example Restricted Switching Schema Thinklogical routers can be restricted on a port-by port basis. A priority level is assigned to each port. Ports can communicate with other ports, but only if the other port s priority level is equal to or less than theirs. For instance, in this diagram, Port 4 Receiver has a priority level of 1. Therefore, it can only communicate to Transmitters with priority level 1, which is the Transmitter on Port 9. Alternately, the Port 1 Receiver has a priority level of 4. Therefore, it can communicate to Transmitters with priority levels of 4 and below, which include the Transmitters on Ports 9, 8, 7 and 6. Since Thinklogical implements restricted switching in firmware, a perpetrator would need to gain physical access to the router to launch an attack that includes violating the structure. 12
13 Thinklogical has provided hundreds of systems to users in the most secure markets in the world, such as the US Military and Intelligence Community, several European militaries and NATO. Summary The need for secure KVM and Video Routing systems is higher now than it has ever been. At the same time, technology advances are enabling innovative system design options that significantly improve the security of the KVM or Video system. Thinklogical is the world leader in providing these innovations. Robust technological approaches to partitioning, restriction, monitoring and resiliency, delivered in a fiber optic based architecture have caused customers with the need for highly secure systems to choose Thinklogical. Perhaps most importantly, Thinklogical s leadership is substantiated by their unique accreditation to Evaluation Assurance Level 4 under The Common Criteria and TEMPEST, Level B. This has resulted in deployment of Thinklogical systems in hundreds of secure facilities worldwide. For more information or a complimentary consultation on your secure system needs, please contact the Thinklogical Design Center at or [email protected] Thinklogical. All rights reserved. Thinklogical, claims or other product information contained in this document are subject to change without notice. This document may not be reproduced, in whole or in part, without the express written consent of Thinklogical Washington Street Milford, CT USA 13 Thinklogical Design Center [email protected]
Increase your network s security by making the right premise cabling decisions
Increase your network s security by making the right premise cabling decisions André Mouton, Product Line Manager Benoit Chevarie, Product Line Manager August 2006 Revision 2 Increase your network s security
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Managing Physical Security Risk in Physical Layer Infrastructure Solutions
Managing Physical Security Risk in Physical Layer Infrastructure Solutions Protecting Against Network Intrusion Using Keyed Connectivity Systems www.panduit.com WP-05 November 2008 Introduction Industries
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment 2009, Raritan Inc. Executive Summary While many organizations have employed
IP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc. Agenda Goal: Present an overview of Tap
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Optimizing Infrastructure Support For Storage Area Networks
Optimizing Infrastructure Support For Storage Area Networks December 2008 Optimizing infrastructure support for Storage Area Networks Mission critical IT systems increasingly rely on the ability to handle
How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
BROADCASTING AT A WHOLE NEW LEVEL
BROADCASTING AT A WHOLE NEW LEVEL White Paper August 2014 Table of Contents Introduction: The Broadcasting Market...1 Broadcasting: High Definition, by Definition...2 The Infrastructure Challenge...2 HDBaseT:
BLACK BOX Scalable matrix KVM switch supports up to 1024 ports with fiber or copper cable.
ServSwitch DKM DVI-D KVM Matrix Switch Delivers instant switching in four different modes for data center, control room, and classroom settings. BLACK BOX Scalable matrix KVM switch supports up to 1024
Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet
Things You Must Know About Gigabit Ethernet 1. Understanding Gigabit Ethernet Today s network managers know that modern demands on a network by its users can shrink bandwidth dramatically. Faster computers,
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Flexible and Flawless Get a hold of every critical moment instantly without compromise
Flexible and Flawless Get a hold of every critical moment instantly without compromise KE6900T / KE6940T KE6900R / KE6940R Over IP Extend, split and switch keyboard / mouse, high definition video, USB
Media Conversion in Video Security and Surveillance Systems
The Conversion Technology Experts Media Conversion in Video Security and Surveillance Systems Worldwide Headquarters 6475 City West Parkway Eden Prairie, MN 55344 USA tel 952.941.7600 toll free 800.526.9267
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network
Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network What This Section Will And Will Not Cover What we will talk
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
T1 Networking Made Easy
T1 Networking Made Easy 1 THE T1 CARRIER 3 WHAT DOES A T1 LOOK LIKE? 3 T1 BANDWIDTH 3 T1 PHYSICAL CHARACTERISTICS 4 T1 FRAMING 5 LINE CODE 6 T1 NETWORKING 6 TELCOS 6 PSTN ACCESS WITH A T1 8 SUMMARY OF
Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development
Fibre Channel Overview from the Internet Page 1 of 11 Fibre Channel Overview of the Technology Early History and Fibre Channel Standards Development Interoperability and Storage Storage Devices and Systems
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Using AnywhereUSB to Connect USB Devices
VMWARE TECHNICAL NOTE VMware ESX Server Using to Connect Devices Digi International s Remote I/O Concentrator is a remote networking solution that utilizes over IP technology, called RealPort, to enable
Fiber Distributed Data Interface
CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI
APC Enterprise KVM Switches
APC Enterprise KVM Switches Introduction You need more than point access products. You need a system that provides more control, flexibility and scalability than ever before. Systems that reduce your Mean
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Virtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
Fail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE CRITICAL NATIONAL INFRASTRUCTURE The UKs national infrastructure is defined by Government as those facilities, systems, sites
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Unified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
SECURING A STORAGE AREA NETWORKS
RESEARCH ARTICLE OPEN ACCESS SECURING A STORAGE AREA NETWORKS R.Sumangali *1, Dr.B.Srinivasan #2 Assistant Professor, Department of Information Technology Gobi Arts & Science College, Gobichettipalayam,
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC End-to-end Infrastructure Protection for Institutions In the last few years, the demand for classified information experienced by many government
IsumaTV. Media Player Setup Manual COOP Cable System. Media Player
IsumaTV Media Player Setup Manual COOP Cable System Visual Setup Front: Router Scan Converter Media Player Video Modulator Equipment: Media Player: Router: Scan Converter: Video Modulator: This computer
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Course Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Taking KVM Switches Beyond the Data Center
71 Overview of KVM For nearly three decades, KVM (keyboard/video/mouse) switches have been a critical technology asset for organizations of all sizes. During the early 1980s, the boom in the computer industry
FatPipe Networks www.fatpipeinc.com
WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool
Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform
Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
An Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Intelligent Solutions for the Highest IT Security Requirements
Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
ALL-ZC-2140P-DVI PCoIP Zero Client Overview
ALL-ZC-2140P-DVI PCoIP Zero Client Overview TERA2140 DVI PCoIP Zero Client Overview Teradici is the developer of the PC-over-IP (PCoIP) remote desktop protocol, which is leveraged in several VDI solutions
White Paper Creating a Video Matrix over IP
White Paper Creating a Video Matrix over IP As the worlds of AV and IT converge, software is rapidly becoming the new frontier of AV development. In the old days, once there was a picture on the screen
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
IBM Enterprise Linux Server
IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
