A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR
|
|
|
- Jonah Arthur Robbins
- 9 years ago
- Views:
Transcription
1 A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR E. Tomur, R. Deregozu, and T. Genc Abstract In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture. Keywords Remote access, wireless networks, security, virtual private networks, RBAC. O I. INTRODUCTION NE of the most important business requirements of our age is always-available computing. Providing anywhere, anytime access to corporate resources for mobile employees turns out to be an inevitable need for enterprises of next decade since majority of key business processes (80% according to Gartner [1]) will involve exchange of information with remote workers. Extending the office for employees to their home, their cars or anywhere they have Internet connection, remote access brings in competitive advantage for corporations by enabling access to critical information at anytime. A case study conducted by Adesso Systems Inc. shows that a 30% improvement in the efficiency of key business processes can be achieved when suitable remote access architecture is implemented [2]. Despite the productivity gains and competitive differentiation brought by always-available computing, corporations seem reluctant in deployment of remote access systems. While one main reason for this is the excessive diversity of remote access technology alternatives which confuse IT managers about choice of the best solution, the other one is the concerns about security gaps which may arise when an organization opens its enterprise network to the outside. Although there are several companies which deliver Manuscript received September 15, E. Tomur is with the Banking Regulation and Supervision Agency, Ankara, Turkey (corresponding author to provide phone: ; fax: ; etomur@ bddk.org.tr). R. Deregozu is with the Banking Regulation and Supervision Agency, Ankara, Turkey ( [email protected]). T. Genc is with the Banking Regulation and Supervision Agency, Ankara, Turkey ( [email protected]). turnkey remote access solutions for corporations which do not have enough IT expertise, the cost of such outsourcing solutions may outweigh the revenues gained by productivity increases that remote access provides. In this paper, we present an architecture called WiSeR for implementing Wireless Secure Remote access to resources of enterprise network. The proposed architecture is productindependent. Corporations can use it to implement their own remote access system by using COTS (Commercial Off-the- Shelf) products. WiSeR combines the security of VPN (Virtual Private Network) technology with the flexibility of wireless access. Besides, it implements the Temporal and Spatial Role Based Access Control (TS-RBAC) model proposed in [3] and therefore, is able to provide granular access control to corporate resources. With WiSeR, corporations can enjoy the benefits introduced by remote access without being worried about whether they have chosen the appropriate and secure remote access solution among available alternatives. In addition, corporations do not have to endure high costs charged by turnkey remote access service providers since the only cost for WiSeR is of the required hardware and software. The rest of this paper is organized as follows: In Section II, we first mention the business drivers behind remote access and then explain remote access technology alternatives with a particular focus on VPN. Section III illustrates how wireless technologies can be incorporated into VPN. Section IV introduces RBAC concept. In Section V, we present the proposed WiSeR architecture and in Section VI, we mention the implementation of it for Turkey s Banking Regulation Supervision Agency and give our experiences. Finally, in Section VII, our conclusions are presented. II. REMOTE ACCESS Remote access means providing users who are away from the enterprise with the ability to access information resources residing in the corporate network. In this way, remote users can perform their job-related tasks from anywhere they have a network connection to their main site as if they are in the office. The convenience of having access to critical information by using a remote access infrastructure is an early form of ubiquitous computing [4] indicating the availability of information from anywhere and at any time. In order to profit from the advantages of remote access, an appropriate method for the corporation should be chosen 1248
2 among several remote access technology alternatives. The selected method should satisfy the information needs of remote workers in a convenient and cost-effective way, and at the same time, it should not expose any security vulnerabilities for the information systems of the enterprise. There are several remote access options such as dialing-up into a remote access server (RAS), connecting over private circuits like leased-lines or utilizing Internet as the communication medium and providing security with VPN. We will briefly mention VPN since it is the remote access method used in our proposed architecture. More detailed information on VPN and other remote access technologies can be found in [5]. A virtual private network is a secure connection through an insecure public network, e.g. the Internet, where the confidentiality and integrity of the transmitted information is ensured by some tunneling protocols, which actually designate the public network as virtually private by encryption. As it can be used to set up a secure connection between two remote local networks over a public wide area network, VPN is also a very promising remote access alternative when compared to expensive leased lines or slow dial-up connections. VPN also offers great flexibility because the only prerequisite for connection is an entry point to the Internet. In next section, we will inquire the possibility of further increasing VPN s flexibility by using it together with wireless access. III. VPN AND WIRELESS ACCESS Lately, the wireless access technologies such as Wi-Fi wireless local area networks (WLAN) and WiMAX broadband wireless access have been very popular. The answer of the question about whether these wireless technologies can be utilized for making remote connections more comfortable by allowing non-tethered and mobile access from remote locations is yes. Since both Wi-Fi and WiMAX operate on the second layer of the OSI model, they do nothing more than providing link layer network connectivity just as a dial-up or ADSL connection does. More specifically, once a remote user gains access to the central site over Internet via a wireless hotspot, she can then make a VPN connection without any problem since VPN operates above the wireless link layer. Nevertheless, there remains one more point to be clarified before one can use wireless technologies together with VPN as a remote access method without leaving any cause for concern: This is the well-known and documented insecurities of wireless access methods [6], [7]. Fortunately, security vulnerabilities particularly present in Wi-Fi do not jeopardize the strong security provided by VPN technology when configured properly. In fact, VPN can be used to protect IEEE WLANs replacing the weak WLAN security protocols like WEP with robust authentication and encryption mechanisms of IPSec VPNs, as detailed in [8]. Therefore, the flexibility of wireless networks can be utilized in remote access when combined with the security of VPN technology since it protects the confidentiality and integrity of data in an end-to-end fashion from the client computer to the VPN gateway even for the data transmitted on the air by radio waves. Although IPSec VPNs ensure integrity and confidentiality of data on the way both from client computer to wireless access point and from access point to the VPN gateway without any need to rely on WLAN security, some form of authentication is needed to prevent unauthorized clients from associating with the access points installed at remote sites where remote employees work. Since these access points are used as a means for Internet access of remote workers as well as remote access, unauthorized users should be prevented from accessing the Internet over those wireless access points. Strong VPN authentication mechanisms allowing only authorized clients to launch VPN connections to the main site do not provide any protection for war drivers having free Internet access over the wireless access point and therefore another authentication mechanism is needed for wireless access. Strong authentication for WLANs can be achieved by the employment of IEEE 802.1X standard [9] X is a port based authentication framework, and when used with Extensible Authentication Protocol (EAP) in a wireless LAN, mutual authentication between clients and access points can be achieved via an authentication server. Several mechanisms such as EAP-MD5, EAP-TLS, EAP-TTLS or EAP-PEAP can be chosen as authentication method when 802.1X is used. Since it uses public key certificates for both the client and the server to verify their identities to each other, EAP-TLS is a very secure option and, that is why it is chosen as the wireless authentication mechanism of WiSeR. Despite the security advantages it brings in, deployment of EAP-TLS for wireless access systems installed at remote locations has some problematic issues due to the authentication servers required. Because it is not feasible to employ individual authentication servers at each remote access location due to scalability problems, a centralized solution is needed which utilizes a single authentication server at the main site to authenticate wireless clients at all locations. Our proposed architecture, WiSeR, incorporates such an authentication solution in addition to the VPN security and a special role based access control mechanism with time and location constraints. Before giving details of WiSeR, we summarize the basics of role based access control in the next section. IV. ROLE BASED ACCESS CONTROL (RBAC) Role Based Access Control mechanisms, where the access rights to the data and resources are granted based on the job responsibilities, have been widely used for years. In RBAC, roles are created according to the job functions performed in an organization, permissions are granted to those roles, and finally, users are assigned to the roles in accordance with their specific job responsibilities and qualifications. Therefore, a role is a collection of permissions, and only those users who 1249
3 In our proposed architecture, we utilize both spatial and temporal role based access control models as presented in [3]. Therefore, level of access from remote site to corporate network resources is determined by the role of the remote user, his/her location and time of access request. Besides, method and strength of VPN encryption is chosen according to the role of the user. Fig. 1 The general RBAC model 1 are assigned to this specific role can perform operations on resources within the permission boundary of the role. In Fig. 1, this relationship is illustrated as proposed by the general RBAC model of [10]. RBAC is a remarkable alternative among access control methodologies. It supports three wellknown security principles, namely, least privilege, separation of duties and data abstraction. In addition, since it suffices to revoke the old role and assign the new role when job function of a user is changed, burden on system administration is reduced. A final worth-mentioning property of RBAC is that it is policy neutral. However, it can be configured to enforce traditional models such as discretionary and mandatory access control as presented in [11]. Owing to advantages described in this paragraph, several practical RBAC applications have been implemented ([12], [13]). There has also been research on several aspects of RBAC such as bringing formalism to RBAC models ([14], [15]) and providing other constraints like time and location for determination of role permissions. In [16] and [17], for instance, RBAC model is extended such that temporal constraints are taken into consideration while granting permissions to roles associated with users. In temporal RBAC models, considering the organizational functions and services with temporal requirements (e.g., part-time staff working only from 9 am to 2 pm or day doctors performing his/her duty only on certain days), role permissions are allowed to be active during certain time periods and non-active during others. This way, not only the role itself but also the time determines granting of permissions, and thus, performs access control. On the other hand, with the widespread use of mobile equipment such as laptop computers and pocket PCs, users now access network resources from several locations in the enterprise. Hence, RBAC models are improved in such a way that role permissions are constrained also by spatial requirements as detailed in several studies such as [18] and [19]. In so-called spatial RBAC models, permissions not only depend on the role itself but also on the location of the role owner. Therefore, a single role has different sets of permissions for different locations. For example, a user with administrator role can have both read and write access to corporate database from his/her desk but have only read access from all other locations. V. WISER: WIRELESS SECURE REMOTE ACCESS The proposed architecture of this paper, which is named as WiSeR, presents a common framework for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. In WiSeR, network connectivity from remote locations to the central site is solely based on the Internet, that is, WiSeR can be used wherever a remote client has Internet access. The security of WiSeR relies on the strong data encryption and integrity preservation methods of VPN, a smartcard-based two-factor authentication scheme used in both VPN and wireless authentication, and the granular access control capability of TS-RBAC. The only required component of WiSeR is a VPN terminating module and its corresponding software. If remote clients reside at fixed designated locations, then a device that will provide Internet connectivity such as a wireless ADSL router is needed at each location. The WiSeR architecture is illustrated in Fig. 2. As shown in the figure, enterprise network of the organization is positioned behind a firewall to permit remote inbound connections only in a strictly controlled way. The VPN gateway, either embedded into the firewall or standing as an individual module, is the termination point of all VPN connections from the remote sites. It handles encryption/decryption and integrity checking processes of all VPN connections as well as the authentication of VPN clients. The wireless authentication server is located in the DMZ (Demilitarized Zone) of the main site s network for not allowing yet unauthenticated connections into the enterprise network. Based on IEEE 802.1X protocol, this authentication server is used to validate the identity of clients attempting wireless access from remote sites. Authentication of both wireless and VPN connections are performed by public key certificates stored in smartcards and this constitutes a strong two-factor authentication mechanism which is much more secure than password-based schemes. The clients at remote sites possess their smartcards where certificates are stored and these clients are equipped with laptop computers that have smartcard readers installed. If client-based VPN approach rather than SSL VPN is chosen, also VPN client software has to be installed on the client computers. Wireless Internet access gateways are set up at each pre-determined remote access location. As shown in the figure, for instance, remote sites A and B have wireless ADSL routers that connect remote employees residing at these locations to the Internet in a wireless fashion. Of course, an active ADSL line or any other active connection to the 1250
4 Internet should be present at these designated remote access locations. Besides, wireless Internet access devices like the ADSL router should be pre-configured for Internet access with service provider s settings and for 802.1X authentication. As mentioned before, not only the designated locations where remote employees are present at all times but also any other location where a user can access Internet can be used for secure remote access in WiSeR architecture. For example, wireless secure remote access using an hotspot in an airport or a dial-up Internet connection from users homes is possible as shown in Fig. 2. In that case, there is no need for wireless authentication since this should be handled by the service provider. Another important property of our proposed architecture is the extra security provided by use of temporal and spatial role based access control. In WiSeR, the level of security (method and strength of encryption, and access rights) is determined by the triple (role, location, time). The role is the same as the role concept in RBAC and refers to the organizational position of the remote user such as head auditor, auditor or support personnel. The location is the place where remote access attempt is initiated. We determine the location from the IP address information. We assume that the real IP addresses used for Internet access in designated remote sites are static and known. All IP addresses other than those known addresses are taken as a special category called AnyLocation. And, the last element of the triple, time refers to the time of the day where access request is initiated. When a user attempts to access a corporate network resource remotely, he/she is first authenticated and encryption method is chosen according to his/her role, then he/she is granted an appropriate access level based on both time of Fig. 2 Proposed wireless secure remote access (WiSeR) architecture TABLE I RULE BASE OF THE FIREWALL Source Destination Service Action Work_ Hour Work_ Hour remote_sites DMZ_Network EAP Accept Group1@ remote_sites Group1@ remote_sites Group2@ remote_sites AllUsers@ AnyLocation Intranet HTTP Encrypt Database_Server SQL Encrypt All_Corporate_ ANY Encrypt Network Mail_Server SMTP Encrypt ANY ANY ANY DROP access and his/her location. This access control is performed by the firewall. The example rule base of a firewall performing this temporal and spatial role based access control is given in Table I. Here, group1 and group2 are two user groups where low-profile (support personnel) and high-profile (auditors) users are members respectively and remote_sites is a network object composed of known IP addresses of all designated remote sites. When the security policy illustrated in Table I is enforced, a remote user can access (a) only from the location he/she is allowed, (b) only to network resources that he/she is allowed, (c) only for the services and applications he/she is allowed, (d) only at the time duration he/she is allowed and, (e) with encryption method and strength appropriate for him/her. First four items (a,b,c,d) are related to access control and determined by the triple (role, location, time) while encryption in the last item (e) is determined by the role of the user. For 1251
5 instance, users of group2 can access any service from only the designated remote sites during only work hours whereas group1 users are allowed merely for Intranet and DB server access. All users are permitted to access their at any remote location and at any time. In an organization that uses the proposed WiSeR architecture described above for wireless secure remote access, the order of events occurring when a client attempts to access enterprise LAN (local area network) from a remote location is as follows: 1) Client machine tries to associate with the wireless access point at the designated remote site where the employee is located. Authentication information for this wireless connection attempt is sent to the authentication server residing in corporate network DMZ over Internet on EAP port (the first rule of firewall permits this). If this EAP-TLS authentication is successful, remote client will be authorized for only Internet access over the wireless access point. 2) Using the authorized wireless Internet access at the designated location or any kind of Internet access at any other location, remote client establishes network connectivity to the VPN gateway. 3) VPN gateway challenges the remote client for access authorization to the enterprise network. If client successfully authenticates, VPN gateway permits access to enterprise network through the Firewall for allowed services based on the role, location and time information, 4) After VPN authentication, key exchange process is performed between the client and the VPN gateway. Using these exchanged keys, all traffic from the client machine to the VPN gateway is encrypted in accordance with the role of the client providing required level of confidentiality and integrity for transmitted data along the entire remote access path. The WiSeR architecture whose operational steps are given above offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. In this proposed architecture, proven securities of VPN technology, role based access control and 802.1X authentication framework are combined. Several strong encryption methods such as 3DES and AES and integrity preservation schemes such as MD5 and SHA1, and any other method supported by employed VPN module can be utilized. Since both VPN and wireless authentications are based on a something you know (smartcard PIN) and something you have (certificate) scheme, the risk of having unauthorized connections is very low. On top of this, when client-based VPN approach is preferred, central security policies can be loaded into the remote client computers from the main site to mitigate attacks to client machines from the Internet, thus contributing to the sound security of WiSeR. Finally, employment of the temporal and spatial RBAC mechanism ensures that a remote user can access a network resource only if there exists a role that the user is a member of and that role contains a permission at the specific location and time. Therefore, TS-RBAC mechanism increases the security provided by WiSeR as formally verified in [3]. The possibility of making secure remote connections at any location where Internet is present makes WiSeR a very flexible remote access alternative. Wireless coverage areas set up at designated remote employee locations not only enable mobile connections but also remove the burden of cabling at remote sites in which cable installation may not be possible. The last but not least issue making WiSeR a very flexible solution is the convenience in its implementation using COTS products. In other words, WiSeR is not dependent on any specific product and can be implemented using any VPN hardware/software, smartcard or authentication server. Finally, WiSeR is an economical remote access solution since it does not involve any high outsourcing costs. It can be implemented in-house even in organizations with a limited IT know-how due to its simple and straightforward architecture. VI. IMPLEMENTATION OF WISER The WiSeR architecture presented in this paper is originally developed for providing the remote employees of Banking Regulation and Supervision Agency (BRSA) of Turkey with a secure remote access method. The proposed architecture has been fully implemented, and at the time being, auditors of BRSA working at more than 50 remote locations access to information resources of BRSA network in a wireless fashion. In this implementation, a Checkpoint firewall with VPN module, SecureClient VPN software and Microsoft IAS as the wireless authentication server are used. Each of these designated remote sites is provided with 512K ADSL Internet access and US Robotics wireless ADSL routers are installed at these sites for wireless coverage. The described setup is successfully performing the expected functionality of remote access requirements of BRSA employees in a secure fashion. While auditors working at remote locations reach enterprise resources from their working area as if they are in the office, all other employees can also access to corporate network from any remote location. VII. CONCLUSION This paper presents an architecture called WiSeR to implement wireless secure remote access to information resources of the enterprise network of an organization. The key feature of the proposed architecture is the utilization of security of VPN technology and role based access control mechanism together with the flexibility of wireless access in a combined manner. Strong encryption methods of VPN technology, a very secure two-factor VPN authentication scheme based on public key certificates, temporal and spatial role based access control policy and the employment of 802.1X wireless authentication are important security aspects provided by WiSeR. Wireless access areas constructed at remote employee locations not only enable mobile remote connections but also provide great flexibility since it does not require any cabling at remote sites. Furthermore, WiSeR enables the possibility of making secure remote connections at 1252
6 any location where any kind of Internet access is present. As a result, with WiSeR, corporations can enjoy the competitive business benefits of remote access without comprising any security risks and without enduring high outsourcing costs charged by turnkey remote access service providers. REFERENCES [1] W. Clark, Enterprises Must Assess Impact of Mobile Applications, Gartner Inc. Report, [2] Always Available Computing: Best Practices for Empowering Today s Mobile Work Force. Available: [3] E. Tomur and Y.M. Erten, "Application of temporal and spatial role based access control in wireless networks", Computers & Security, vol. 25, no.4, pp , September [4] M. Weiser, Hot Topics: Ubiquitous Computing, IEEE Computer, October [5] S. Harris, CISSP All-In-One Guide. McGraw-Hill Publications, 2004, ch.7. [6] N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications: The insecurity of , in Proc. of the Seventh Annual International Conference on Mobile Computing and Networking, [7] S. Fluhrer, I. Martin, and A. Shamir, Weaknesses in the key scheduling algorithm of RC4, presented at Eighth Annual Workshop on Selected Areas in Cryptography, August [8] E. Tomur and Y.M. Erten, A layered security architecture for corporate wireless networks, presented at 2 nd Wireless Telecommunications Symposium, Pomona, CA, [9] IEEE Standards for local and metropolitan area networks: Standard for port based network access control, IEEE draft P802.1X/D11, March [10] R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, Role-based access control models, IEEE Computer, vol. 29, no. 2, February [11] S. Osborn, R. Sandhu, and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol. 13, no. 2, February [12] J. Barkley, K. Beznosov, and J. Uppal, Supporting relationships in access control using role based access control, in Proc. of 3rd ACM Workshop Role Based Access Control, Fairfax, VA, October [13] D. Ferraiolo, J. Barkley, and D. Kuhn, Role-based access control and reference implementation within a corporate intranet, ACM Transactions on Information and System Security, vol. 2, no. 1, [14] M.J. Moyer, and M. Abamad, Generalized role-based access control, in Proc. of 21st International Conference on Distributed Computing Systems, April [15] M. Koch, L.V. Mancini, and F. Parisi-Presicce, A Graph-Based Formalism for RBAC, ACM Transactions on Information and System Security (TISSEC), vol. 5, no. 3, [16] E. Bertino, P.A: Bonatti, and E. Ferrari, TRBAC: A temporal rolebased access control model, ACM Transactions on Information and System Security, vol. 4, no. 3, [17] J.B.D Joshi, E. Bertino, U. Latif, and A. Ghafoor, A Generalized Temporal Role-Based Access Control Model, IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp 4 23, January [18] F. Hansen, and V. Oleshchuk, Spatial role-based access control model for wireless networks, presented at Vehicular Technology Conference, [19] M. Wilikens, S. Feriti, A. Sanna, and M. Masera, A context-related authorization and access control method based on RBAC: A case study from the health care domain, presented at Seventh ACM Symposium on Access Control Models and Technologies,
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Building Remote Access VPNs
Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Secure Network Design: Designing a DMZ & VPN
Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Remote Connectivity for mysap.com Solutions over the Internet Technical Specification
Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Wireless Security Architecture
Wireless Security Architecture Saeed Rajput Dept. of Computer Science and Eng. Florida Atlantic University http://www.cse.fau.edu/~saeed Saeed Rajput, 2005 1 Which Security? Link Layer Network Layer Transport
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
Firewalls. Outlines: By: Arash Habibi Lashkari July 2010. Network Security 06
Firewalls Outlines: What is a firewall Why an organization ation needs a firewall Types of firewalls and technologies Deploying a firewall What is a VPN By: Arash Habibi Lashkari July 2010 1 Introduction
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
By Masaya NORIFUSA* ABSTRACT. SAFEBORDER is an SSL VPN appliance product that offers a unique remote access solution to
Papers on UNIVERGE Hardware SAFEBORDER as SSL VPN Uniquely Enables New Style of Business Communications by Connecting Corporate Intranets and the Internet Seamlessly By Masaya NORIFUSA* SAFEBORDER is an
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
VPN Technologies: Definitions and Requirements
VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.
VPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key
How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key Objective This article will detail how to setup Cyberoam VPN Client to securely connect to a Cyberoam for the
A Smart Telephone Answering Machine with Voice Message Forwarding Capability
A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Software Defined Perimeter Working Group. SDP Hackathon Whitepaper
Software Defined Perimeter Working Group SDP Hackathon Whitepaper April 2014 2014 Cloud Security Alliance All Rights Reserved. All rights reserved. You may download, store, display on your computer, view,
SpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
What would you like to protect?
Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
MaaS360 Mobile Service
Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
Security and privacy in public WLAN networks
Security and privacy in public WLAN networks Savio Lau [email protected] March 01, 2005 Roadmap Introduction of public WLAN networks Network security User privacy Experiments and analysis Conclusion March
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Advanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Unified Services Routers
High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
Linux Access Point and IPSec Bridge
Tamkang Journal of Science and Engineering, Vol. 6, No. 2, pp. 121-126 (2003) 121 Linux Access Point and IPSec Bridge T. H. Tseng and F. Ye Department of Electrical Engineering Tamkang University Tamsui,
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
Ensuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Wi-Fi in Healthcare:
Wi-Fi in Healthcare: Security Solutions for Hospital Wi-Fi Networks Wi-Fi Alliance February 2012 The following document and the information contained herein regarding Wi-Fi Alliance programs and expected
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
