THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION
|
|
|
- Aubrey Bryan
- 10 years ago
- Views:
Transcription
1 THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION Joan Fowler and Robert C. Seate III Data Systems Analysts, Inc Eaton Place, Suite 400 Fairfax, VA / (voice) 703/ (fax) [email protected] and [email protected] Abstract The current trend for the communication of Command, Control, Communications, Computers, and Intelligence (C 4 I) information is a shift from point-to-point, closed, dedicated networks to the use of distributed, open, commercial networks. The threats and vulnerabilities that existed in the closed environment are different in scope and type from those that exist in the open environment. For this reason, mitigation techniques need to be refined and updated to reflect new risks to C 4 I and sensitive information. Introduction The shift from the closed network to the open network for transmitting sensitive information is occurring largely because of the cost and lifecycle duration and risks of the traditional closed network. The closed network has traditionally taken longer to develop, cost more to both develop and maintain, held all of the programmatic risks of a development effort, and provided the lifecycle costs/risks inherent with a proprietary entity. On the other hand, the open network and network technology currently exists. Therefore, the extension of the network for new customers should, and usually does, take a shorter time for connections which are usually sold to the Government on a fee-for-service basis. There is frequently little or no development effort involved. The maintenance of the open commercial network is spread across all of the users, not just the Government owners of the network. Finally, since the technology is not proprietary, the open network makes use of the state-of-the-art technology that can be developed using the economy of scale available because of the open environment. All of these issues are outside of the direct security aspects of the closed/open choice. However, because of the advantages of the open environment, the decision is being made to go toward the open environment for both unclassified
2 as well as sensitive traffic. Therefore, the threats, vulnerabilities, and risks associated with the open commercial environment must be assessed and mitigated to provide an service that is as protected as possible. safe Threats and Vulnerabilities The threats and vulnerabilities in the closed environment are predicated by the very nature of the networks: limited access points, historically customized applications, and known technologies. The threats and vulnerabilities in the new open environment are: increased access points to a portion of the network; global availability of access to the network; more sophistication of today s hackers; and new technologies for which the vulnerabilities have not been characterized. Because there are more points of presence, the number of unauthorized access points has increased. Furthermore, because of this maze of connectivity, the access technique and a clear path between origination and destination points become obscured. Closed Environment In the closed environment, limited legitimate access points are available to the intruder of the network. Due to this named accessibility, the corresponding limited threat provides a limited vulnerability for the network. Comparatively speaking, the closed environment can control access through protection of the limited resources through mitigation techniques that are non-technical, i.e., physical security of the environment and personnel security clearances. Figure 1 illustrates the simplified approach historically used for communications between facilities of C 4 I and classified information. Customized applications have historically been used in the closed environment to fulfill the specific requirements for the network/system. Therefore, the sponsoring organization can provide the kinds of control on the development effort that provide a level of confidence associated with the effort and the resulting product. Extensive testing of the product/system can be performed to ensure that not only the requirements have been met, but that anomalies have not been introduced into the network. Finally, in the traditional closed environments used for C 4 I information, known technologies (e.g., operating systems, platforms) have been used because of the procurement and development time for the customized system. By the time that the system or network is ready to be fielded, the technology that comprises the system has usually been tested and fielded in an operational environment. This operational experience with the technology provides a determination of the vulnerabilities inherent in the product and, usually, a mitigation of that vulnerability so that the risk of using the product is acceptable.
3 Open Environment Figure 1. Closed Point-to-Point Environment The threats and vulnerabilities in the new open environment are: increased access points to a portion of the network; global availability of access to the network; increased sophistication of today s hackers; and new technologies for which associated vulnerabilities have not been characterized. As can be seen in Figure 2, the complete globe today is in the cloud developed for world-wide communications. The benefit of this communication is that the world is accessible from almost everywhere. The challenge: protect the cloud against unauthorized intrusion and denial-of-service. The networks that are being used to handle the communication of C 4 I information today, and even more in the future, are restricted to limited access points as in the past. The number of points of presence, or points at which the user can gain access, has been increased to provide more availability to the network. This free flow of access enhances the availability and use of the open environment for authorized users. However, because there are more points of presence, the number of unauthorized access points has also increased. This increases the threat to the network by unauthorized users, and the vulnerability of the open environment to these unauthorized users.
4 Figure 2. Open Global Environment The open environment to be used for the communication of C 4 I information is truly a global network. This global characteristic of the network translates into the availability of access to the network on the global level. Therefore, a user in Hong Kong is connected logically to the same global network that the users communicating, for instance, between Fort Bragg and Fort Hood are connected. This vulnerability of the cloud or global network invites those that desire to interrupt or intercept legitimate traffic, and not just C 4 I information to disrupt that traffic. Frequently, the intruder/interrupter is so technically astute that the effort to disrupt is not a challenge to them at all. Because of this maze of connectivity, the access technique and a clear path between origination and destination points becomes obscured. There are numerous techniques that can be applied to gain access to the open environment. That is a functional advantage of the environment. However, from a security perspective, it presents a vulnerability to the environment. Additionally, it is not possible for any user to determine prior to transmission the exact route that a packet of information will take to reach it s destination. Therefore, it is also not possible for the user sending a packet to be assured that the information will not be vulnerable to a particular threat at some instance along the way. Today s hackers are far more sophisticated than those in the past. With the decrease in the cost of personal computers and software, and the availability of more powerful communications resources and additional shareware tools through the Internet, hackers have the tools available for them to wreak havoc on a global scale. Additionally, with the proliferation of technical skills to a wider variety of individuals, it is more common for any individual to have the needed
5 technical skills to intrude into a network. Therefore, current hackers have the technical ability to intrude in the legitimate traffic of the global open environment. New technologies make the open, global communications environment possible. However, the vulnerabilities inherent in much of these new technologies have not been characterized through operational experience. When a new technology is inserted into the cloud, often times the vulnerabilities are not defined until the technology has been in operational use for awhile and the hackers have had a chance to attack it and find weaknesses with it for a period of time. This trial under fire for new technology leaves the open environment vulnerable for a time. Paradigm for Mitigation To reach an acceptable level of risk for the communication of C 4 I and other sensitive information, there are a number of mitigations that can be applied to these threats and vulnerabilities. Some of the mitigations include: more robust standards for both communications and security technologies; the use of a layered security architecture to compartmentalize network availability; more sophisticated Commercial Off-The-Shelf security and general communication products; the availability and use of online tools to test for vulnerabilities and monitor/respond to incidences; greater availability of information on threats, vulnerabilities and potential mitigations; and heightened security awareness throughout the open environment. Standards As a result of the technology industry s response to the need for consistent baseline standards and defined processes, organizations such as the National Institute of Standards and Technology (NIST), International Standards Organization (ISO), and International Telegraph and Telephone Consultative Committee (CCITT) have researched, developed, and gained consensus for more robust standards associated with communications and security technologies. Examples of these standards include the Commercial Internet Protocol Security Option (CIPSO) and Internet Security Association Key Management Protocol (ISAKMP). These standards, as well as others of their type, enhance the security of the open environment. In addition, they increase interoperability of the total network from a security perspective. Layered Security Architecture The current trend in security architecture system design is to provide a multilayered identification, authentication, and protection schema. In doing so, a security architecture design contributes a compartmentalized approach to network availability (i.e., each layer provides an independent level of protection
6 of which the aggregate results in a more robust security blueprint). Furthermore, by separating and using independent but interconnected layers, one or more of these layers could withstand being compromised without adversely affecting the aggregate countermeasure schema for denial-of-service, intrusion, and detection attacks. Sophistication of Products Today, security hardware and software products offer more sophisticated commercial off-the-shelf (COTS) features and functionalities. In addition, as communication technology advances, so do the inherent product access control features. Equally important are the increased functionality and stress testing processes associated with the research and development of these products. The technology industry has responded to the information security community requests by providing these important features as part of their regular product offerings. Tools The role of the Internet as a resource for information and software dissemination has grown beyond its original inception. The availability and use of online tools to test for vulnerabilities and provide network monitoring has also greatly increased. As new software products are developed, the role of the Internet community becomes a provider of global feedback for alpha and beta versions of these products. This role becomes cyclical as new releases of the software products emerge. As a result, the needs of both the user and the security software developer are very complimentary. Information The Internet also serves as an information superhighway. The security community has taken advantage of this near real-time method of information flow. As new vulnerabilities are discovered, an inflow of information occurs as information security data collection organizations accumulate and categorize this knowledge. Just as important is the organized outflow in information security data by these recognized institutions. Examples of these organizations include the Forum for Incident Response and Security Teams (FIRST), Computer Emergency Response Team (CERT), and Automated System Security Incident Support Team (ASSIST). Furthermore, tested mitigations for these categorized threats and vulnerabilities are also made available to the security community. Because of the global bridge that the Internet provides, efficient information distribution occurs.
7 Security Awareness Security awareness of users, operators, and administrators of the open environment is an important mitigation of the threats and vulnerabilities defined above. Heightened security awareness throughout the open environment occurs in many cases because the types of threats that exist today continue to be assessed and inventoried rapidly. Additionally, the intrusion or disruption of the global network environment is frequently front page news and widely broadcast to both the technical and security community. The importance of information security in a C 4 I environment not only is measured through loss of life indicators, but efficiency of operations and return on investment criterion. As a result, security awareness is quantified as essential to all support phases of mission critical programs. Conclusion The threats and vulnerabilities to the open environment are more varied and increased from those to the closed environment. However, techniques are available to mitigate these threats and vulnerabilities to an acceptable level of risk. Applying these mitigations to the open environment not only benefits emerging and sensitive traffic being carried on these networks, but also strengthens the communications infrastructure within this country.
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency
WHITE PAPER Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency www.ixiacom.com 915-6893-01 Rev. A, July 2014 2 Table of Contents Summary... 4 Introduction... 4 Differing Goals
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop
Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Information Security Risk Assessment Methodology
Information Security Risk Assessment Methodology An Information security risk assessment should take into account system-level risk (inclusive of applications and systems) and process-level risk (inclusive
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Cyber Situational Awareness for Enterprise Security
Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
How To Protect Your Data From Attack
Solutions Brochure Situation Under Control Security Connected for the Public Sector 2 Security Connected for the Public Sector Increase Availability. Strengthen Resiliency. Government entities face pressure
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
NETWORK SECURITY ASPECTS & VULNERABILITIES
NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect
How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager
How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
SECURITY IN THE INTERNET OF THINGS
The Intelligence in the Internet of Things SECURITY IN THE INTERNET OF THINGS Lessons from the Past for the Connected Future By AJ Shipley, Senior Director, Security Solutions, Wind River INNOVATORS START
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
Overview to the Cisco Mobility Services Architecture
Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Unified Communications: The Layman s Guide
White Paper Unified Communications: The Layman s Guide Contents Introduction....2 What can you expect in return?....2 How Unified Communications Works....2 Challenges Ahead....2 Are you ready?....3 About
Is the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance
GUARDING YOUR BUSINESS BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance www.balabit.com In 2008, the Monetary Authority of Singapore (MAS),
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
NETWORK TO NETWORK INTERFACE PLAN
AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based
use it Messaging Fax Over IP (FoIP) Overview
use it Messaging Fax Over IP (FoIP) Overview 2 Use it Messaging Server for FoIP Migrating from traditional PSTN-based faxing to Fax Over IP (FoIP) can generate real cost savings. Use it Messaging from
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
