Network Access Control and Cloud Security
|
|
|
- Katrina Sullivan
- 10 years ago
- Views:
Transcription
1 Network Access Control and Cloud Security Raj Jain Washington University in Saint Louis Saint Louis, MO Audio/Video recordings of this lecture are available at:
2 Overview 1. Network Access Control (NAC) 2. RADIUS 3. Extensible Authentication Protocol (EAP) 4. EAP over LAN (EAPOL) X 6. Cloud Security These slides are based partly on Lawrie Brown s slides supplied with William Stallings s book Cryptography and Network Security: Principles and Practice, 6 th Ed,
3 AAA: Network Access Control (NAC) Authentication: Is user legit? Authorization: What is he allowed to do? Accounting: Keep track of usage Components: Supplicant: User Authenticator: Network edge device Authentication Server: Remote Access Server (RAS) or Policy Server Backend policy and access control Supplicant Authenticator Authentication Server 16-3
4 Network Access Enforcement Methods IEEE 802.1X used in Ethernet, WiFi Firewall DHCP Management VPN VLANs 16-4
5 RADIUS Remote Authentication Dial-In User Service Central point for Authorization, Accounting, and Auditing data AAA server Network Access servers get authentication info from RADIUS servers Allows RADIUS Proxy Servers ISP roaming alliances Uses UDP: In case of server failure, the request must be re-sent to backup Application level retransmission required TCP takes to long to indicate failure RADIUS Customer Network Remote Access Server Proxy RADIUS ISP Net Network Access Server User Ref:
6 Extensible Authentication Protocol (EAP) Old Methods: Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Microsoft CHAP (MS-CHAP Each authentication protocols required a new protocol Extensible Authentication Protocol Allows using many different authentication methods Single-Step Protocol Only one packet in flight Duplicate Elimination and retransmission Ack/Nak Can run over lossy link No fragmentation. Individual authentication methods can deal with fragmentation. One frag/round trip Many round trips Allows using a backend authentication server Authenticator does not have to know all the authentication methods Can run on any link layer (PPP, 802,...). Does not require IP. RFC 3748, EAP, June Ref:
7 EAP (Cont) 16-7
8 EAP Terminology Peer: Entity to be authenticated = Supplicant Authenticator: Authenticating entity at network boundary Authentication Server: Has authentication database EAP server = Authenticator if there is no backend Authentication Server otherwise authentication server Master Session Key (MSK)= Keying material agreed by the peer and the EAP server. At least 64b. Generally given by the server to authenticator. Peer Authenticator 16-8 Authentication Server
9 q q EAP Exchange EAP Message Format: Code Identifier Length [Type] 8b Only four message codes: 8b 16b 8b Request (01) Response (02) Supplicant Success (03) Failure (04) Authenticator Data Identifier is incremented for each message. Identifier in response is set equal to that in request. Type field in the request/response indicates the authentication. Assigned by Internet Assigned Number Authority (IANA) 16-9
10 EAP Types 1 = Identity 2 = Notification (messages to be displayed to user) 3 = Nak 4 = MD5 Challenge (CHAP) 5 = One time password 6 = Generic Token card (GTC) 254 = Expanded types (allows vendor specific options) 255 = Experimental Notification requests are responded by notification responses. Nak type is valid only for responses. Expanded types include a 3B vendor ID and 4B vendor msg type. Expanded Nak is used in response to requests of type 254 and may include alternative suggestions for methods
11 EAP Method X Peer EAP Peer Layer EAP Layer Lower Layer EAP Multiplexing Model EAP Layer demultiplexes using code. Code 1 (request), 3 (success), and 4 (failure) are delivered to the peer layer Code 2 (response) is delivered to the EAP authenticator layer. Both ends may need to implement peer layer and authenticator layer for mutual authentication Lower layer may be unreliable but it must provide error detection (CRC) Lower layer should provide MTU of 1020B or greater Ref: RFC 3748 EAP Method Y EAP Method X Authenticator EAP Method Y EAP Auth. Layer EAP Layer Lower Layer
12 EAP Pass through Authenticator Peer EAP Method X EAP Peer EAP Layer Lower Layer Pass-thru Authenticator EAP EAP Peer Auth EAP Layer Lower Layer EAP Auth EAP Layer AAA/IP Authentication Server EAP Method X EAP Auth EAP Layer AAA/IP EAP Peer/Auth layers demultiplex using type field
13 EAP Upper Layer Protocols Lightweight EAP (LEAP): Uses MS-CHAP. Not secure. EAP-TLS: Transport Level Security. Both sides need certificates EAP-TTLS: Tunneled TLS. Only server certificates. Secure tunnel for peer. EAP-FAST: Flexible Authentication via Secure Tunneling. Certificates optional. Protected tunnels. Protected EAP (PEAP): Server Certificates. Client password. PEAPv1 or EAP-GTC: Generic Token Cards. Client uses secure tokens. EAP-SIM: Subscriber Identity Module used in GSM. 64b keys. EAP-AKA: Authentication and Key Agreement. Used in 3G. 128b keys. EAP-PSK: Pre-shared key+aes-128 to generate keys EAP-IKEv2: Internet Key Exchange. Mutual authentication. Certificate, Password, or Shared secret Ref:
14 EAP over LAN (EAPOL) EAP was designed for Point-to-point line IEEE extended it for LANs Defines EAPOL Added a few more messages and fields Five types of EAPOL messages: EAPOL Start: Sent to a multicast address EAPOL Key: Contains encryption and other keys sent by the authenticator to supplicant EAPOL packet: Contains EAP message (Request, Response, Success, Failure) EAPOL Logoff: Disconnect EAPOL Encapsulated-ASF-Alert: Management alert Message Format: Version=1, Type=start, key,, Ethernet Header Version Type Packet Body Len Packet Body Ref:
15 EAPOL (Cont) 16-15
16 802.1X Authentication framework for IEEE802 networks Supplicant (Client), Authenticator (Access point), Authentication server No per packet overhead Can run at any speed Need to upgrade only driver on NIC and firmware on switches User is not allowed to send any data until authenticated Authentication Server Authenticator Authenticator External Device Ref: Network Connected Device
17 802.1X Authentication Station q q Can I connect please? What s your user name? My user name is john What s your password? My password is mary? You can connect! Access Point Associate EAP Identity Request EAP Identity Response EAP Auth Request EAP Auth Response EAP-Success Authentication Server EAP Identity Response EAP Auth Request EAP Auth Response EAP-Success Authentication method can be changed without upgrading switches and access points Only the client and authentication server need to implement the authentication method
18 EAP with RADIUS 16-18
19 Cloud Computing Using remote resources (Processor, Storage, Network, software, services) Five Characteristics 1. Shared: Resource Pooling 2. Ubiquitous: Broad network access 3. Rapidly Provisioned: Rapid Elasticity 4. Configurable: Measured Service 5. On-demand Self-Service Three Service Models 1. Infrastructure as a Service (IaaS):CPU 2. Platform as a Service (PaaS):CPU+OS 3. Software as a Service (SaaS): Application Four Deployment models 1. Public 2. Private 3. Hybrid 4. Community Ref: M. Schultz, A Survey of Cloud Security Issues and Offerings,
20 Roles Cloud Consumer Cloud Service Provider (CSP) Cloud Broker Cloud Auditor Cloud Carrier: Internet service Provider (ISP) 16-20
21 Cloud Security Risks and Countermeasures 7 Risks and Countermeasures 1. Abuse and Criminal Use: Strict user authentication Intrusion detection Monitoring public blacklists for own network blocks 2. Malicious Insiders: Comprehensive assessment of CSP Human resource requirement as a part of the legal contract Transparency into overall security management Security breach notification process 16-21
22 Risks and Countermeasures (Cont) 3. Insecure Interfaces and API s: Analyze security models of CSP interface Ensure strong authentication and encryption 4. Shared Technology Issues: Monitor environment for unauthorized changes Strong authentication and access control for adminstrators SLAs for patching vulnerability remediation Conduct vulnerability scanning and configuration audits 16-22
23 Risks and Countermeasures (Cont) 5. Data Loss or Leakage: Strong API access control Encrypt data in transit Analyze data protection at design and runtime Strong key generation, storage, management, and destruction 6. Account or Service Hijacking: No sharing of credentials between users and services Strong two-factor authentication Intrusion detection Understand CSP security policies and SLAs 16-23
24 Risks and Countermeasures (Cont) 7. Unknown Risk Profile: Disclosure of applicable logs and data Partial/full disclosure of infrastructure details Monitoring and alerting on necessary information 16-24
25 NIST Guidelines on Cloud Security 9 Guidelines 1. Governance: Extend organizational policies and procedures to cloud Audit mechanisms to ensure that policies are followed 2. Compliance: Understand legal and regulatory obligations Ensure that the contract meets these obligations Ensure that CSP s discovery capabilities do not compromise security and privacy of data 16-25
26 3. Trust: NIST Guidelines (Cont) Visibility into the security and privacy controls of CSP Clear exclusive ownership of data Institute a risk management system Continuously monitor the system 4. Architecture: Understand CSP s provisioning methods and their impact on the security over the entire life cycle 5. Identity and Access Management: Ensure strong authentication, authorization, and identity management 16-26
27 6. Software Isolation: NIST Guidelines (Cont) Understand the virtualization techniques and their risks 7. Data Protection: Evaluate CSP s ability to control access to data at rest, in transit, and in use and to sanitize data Access risk of collating data with other organizations with high threat value Understand CSP s cryptographic key management 16-27
28 8. Availability: NIST Guidelines (Cont) Assess procedures for data backup, recovery, and disaster recovery Ensure critical operations can be resumed immediately after a disaster and other operations can be eventually resumed 9. Incident Response: Ensure contract provisions for incident response meet your requirements Ensure that CSP has a transparent process to share information during and after an incident Ensure that you can respond to incident in coordination with CSP 16-28
29 Data Protection Risks Two database service models: 1. Multi-instance model: Each subscriber gets a unique DBMS on a VM Subscriber has complete control over role definition, user authorization, and other administrative tasks related to security 2. Multi-tenant model: Subscriber shares a predefined environment with other tenants, typically by tagging data with a subscriber identifier CSP needs to establish and maintain a sound secure database environment 16-29
30 Data Protection in the Cloud Data must be secured while at rest, in transit, and in use, and access to the data must be controlled Use encryption to protect data in transit key management responsibilities for the CSP Store only encrypted data in the cloud CSP has no access to the encryption key Encrypt the entire database and not provide the encryption/decryption keys to CSP Can t access individual data items based on searches or indexing on key parameters Need to download entire tables from the database, decrypt the tables, and work with the results To provide more flexibility it must be possible to work with the database in its encrypted form 16-30
31 Data Protection (Cont) 16-31
32 Cloud Security as a Service (SecaaS) SecaaS: Provisioning of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers on-premise systems SecaaS Categories of Service: 1. Identity and access management 2. Data loss prevention 3. Web security 4. security 5. Security assessments 6. Intrusion management 7. Security information and event management 8. Encryption 9. Business continuity and disaster recovery 10. Network security 16-32
33 Summary 1. RADIUS allows centralized authentication server and allows roaming 2. EAP allows many different authentication methods to use a common framework Authenticators do not need to know about authentication methods 3. Many variations of EAP authentication methods depending upon certificates, shared secrets, passwords X adds authentication to LAN and uses EAPOL 5. Cloud computing uses a shared pool of resources. Numerous security issues and counter measures
34 Homework 16 Read RFC 3748 on EAP. Is clear text password one of the EAP authentication method? If yes, what is the code for this. If not, why not? 16-34
Network Access Control and Cloud Security
Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Authentication, Authorization, Accounting (AAA)
Authentication, Authorization, Accounting (AAA) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Authentication, Authorization, Accounting (AAA)
Authentication, Authorization, Accounting (AAA) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
Extensible Authentication Protocol (EAP) Security Issues
Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise
Michael Disabato Service Director Network & Telecom Strategies [email protected] Diana Kelley Senior Analyst Security & Risk Management Strategies [email protected] www.burtongroup.com WiFi
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions
How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
802.1X Client Software
802.1X Client Software REV1.0.0 1910011339 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Chapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo
Chapter 6 - EAP Authentication This chapter describes using Extensible Authentication Protocol with FreeRADIUS. The following topics are discussed in this chapter: EAP Overview Types/Methods Testing with
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Deploying iphone and ipad Virtual Private Networks
Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
802.1x in the Enterprise Network
802.1x in the Enterprise Network Harrison Forest ICTN 6823 Abstract: This paper aims to provide a general over view of 802.1x authentication and its growing importance on enterprise networks today. It
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Network Security 1 Module 4 Trust and Identity Technology
Network Security 1 Module 4 Trust and Identity Technology 1 Learning Objectives 4.1 AAA 4.2 Authentication Technologies 4.3 Identity Based Networking Services (IBNS) 4.4 Network Admission Control (NAC)
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10
Pulse Policy Secure RADIUS Server Management Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved iii Pulse Secure, LLC 2700 Zanker Road,
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard
Allied Telesis White Paper 802.1x White Paper Executive Summary Security and flexibility are often seen as mutually exclusive requirements in a network, yet both are equally important. Security is crucial
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Cryptography and Network Security: Overview
Cryptography and Network Security: Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
Authentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien
Using IEEE 802.1x to Enhance Network Security
Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
The 802.1x specification
The 802.1x specification Fulvio Risso Politecnico di Torino Based on an existing presentation of Piero Nicoletti 1 IEEE 802.1x Port-Based Network Access Control Use physical access characteristics of IEEE
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
D. L. Corbet & Assoc., LLC
Demystifying the Cloud OR Cloudy with a Chance of Data D. L. Corbet & Assoc., LLC [email protected] Why 'The Cloud' Common Clouds Considerations and Risk Why 'The Cloud' Distributed Very Large / Very
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
Joe Davies Principal Writer Windows Server Documentation
Joe Davies Principal Writer Windows Server Documentation Presented at Seattle Windows Networking User Group monthly meeting September 1, 2010 Agenda Brief VPN technology overview VPN features in Windows
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
RAD-Series RADIUS Server Version 7.1
RAD-Series RADIUS Server Version 7.1 Highly Customizable RADIUS Server for Controlling Access & Security in Wireless & Wired Networks Interlink Networks RAD-Series Authentication Authorization, and Accounting
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks
White Paper Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks 1 Scope This document discusses the Extensible Authentication Protocol Transport Layer
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
RAD-Series RADIUS Server Version 7.3
RAD-Series RADIUS Server Version 7.3 Highly Customizable RADIUS Server for Controlling Access & Security in Wireless & Wired Networks Interlink Networks RAD-Series Authentication, Authorization, and Accounting
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
Network Security 1. Module 4 Trust and Identity Technology. Ola Lundh 070 69 86596 [email protected]
Network Security 1 Module 4 Trust and Identity Technology Module 1 Trust and Identity Technology 4.1 AAA AAA Model Network Security Architecture Authentication Who are you? I am user student and my password
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP
SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Intrusion Detection Systems
Intrusion Detection Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Introduction p. 2. Introduction to Information Security p. 1. Introduction
Introduction p. xvii Introduction to Information Security p. 1 Introduction p. 2 What Is Information Security? p. 3 Critical Characteristics of Information p. 4 CNSS Security Model p. 5 Securing Components
