Crypto WDM Surprise! Ari Salomaa, ADVA June 9, 2014
|
|
|
- Berenice Fletcher
- 10 years ago
- Views:
Transcription
1 Crypto WDM Surprise! Ari Salomaa, ADVA June 9, 2014
2 Security & Encryption in Optical Transmission Ari Salomaa, ADVA June 9, 2014
3 Why? When you transport information optically from A to B and you want it to be safe and secure How valuable is your information to you? What is the damage and cost to you IF the information ends up in the wrong hands? in Industry, Finance, Government, Healthcare, 3
4 Top 3 IT Security Issues in 2014 Cyber Attacks Continue [3] Within the next couple of years, we will experience an increasing number of cyber attacks resulting in militaristic and economic damage. As governments worry about the scale of the cyber security threat, we can expect to see more national standards emerge, and greater pressure for voluntary compliance. On the back of emerging standards we will see the cyber insurance market develop and begin to provide market incentives for compliance, whether that is a willingness to insure or reduce premiums. Non-compliance will also lead to a legal debate over liability for incidents. [3] Jarno Limnell, director of cyber security at Stonesoft. 4
5 Data Center Environment & Security Physical Access, Hardware, Software,... APPS APPS 5
6 Data Center Environment & Security and what about the Fiber Connection? APPS APPS 6
7 Fiber Optic Networks Tapping Possibilities Where to get access? Street cabinet Splice boxes / cassettes (Outdoor / Inhouse) How to get access? Y-Bridge for service activities Fiber Coupling device There are multiple ways to access fiber 7
8 Optial Transmission Security 8
9 Optical Security Topics Physical Layer Monitoring Power Tracking Intrusion Detection Optical Time-Domain Reflectometer (OTDR) Access Line Monitoring (ALM) Encryption AES-256 Authentication Diffie-Hellman Security-Hardened Software RADIUS Secure Shell SNMPv3 A complete and integrated solution helps to manage it all 9
10 Physical Layer Monitoring Fiber Cut: Detection through software-adjustable switching thresholds Fiber Degredation: Alarm generation through adjustable fiber attenuation thresholds Long Term Effects: Long term fiber performance information monitoring Intrusion detection through correlation of typical power signatures Fault Location Detection: In-service OTDR measurement or Access Link Monitoring (ALM) to locate fiber problems and possible fiber taps 10
11 Encryption What is the Key for high performance encryption? Compliance with encryption standards Speed - Low Latency Highest level of security Encryption on the lowest possible layer 100% Throughput No Jitter Role Based Management (Multi Tenant Management for Carriers) Total Cost of Implementation Security solution has to meet application requirements 11
12 Encryption Basics 12
13 Encryption Basics Key Lengths Magnitude Number of grains in 1 m 3 sand from the beach 2 40 Number of atoms in a human body 2 92 Number of atoms in the earth Number of atoms in the sun Number of atoms in the Milky Way Number of atoms in the universe AES
14 Basic Cryptographic Goals Alice Bob Eve A priv A pub B pub B priv Alice Bob Eve A priv B priv & Authentication A pub B pub & Authentication Confidentiality (privacy) - "Encryption" Bob cannot understand message from Alice. Diffie Hellman Key Agreement/Exchange is arbitrated in the background. Bob could try to manipulate key exchange to Eve. Solution: Authenticity - "Authentication" Alice and Eve can be sure that they are really connected. 14
15 Throughput Encryption Performance Comparison of Maximum Throughput Framesize / Bytes 15
16 Optical transmission security Speed of Encryption Speed, throughput and simplicity xwdm based Encryption Router Site A WAN Site B Router FC Switch WDM-transport WDM-transport FC Switch Appliance based Encryption Router Site A Site B TDM WAN TDM Router FC Switch FC Switch Ipsec / MacSec Encryption Router Site A WAN Site B Router FC Switch WDM-transport WDM-transport FC Switch 16
17 Encryption Solution Integrated in Optical Transmission platform 17
18 ADVA FSP 3000 Encryption Highlights Protection Building Blocks Authentication via initial authentication key to protect from man in the middle attacks AES256 encryption to offer maximum data security Diffie Hellman (DH) key exchange for secure encryption key generation New encryption key every 1min/10mins for additional security Key lifetime configurable Lowest latency (100ns) while providing 100% throughput 18
19 Layer 1 Encryption Solution Suite 100GbE 40GbE FC 16G FC 10G 10GbE STM-64/OC-192 FC 8G IB 5G FC 4G STM-16/OC-48 FC 2G FC 1G GbE AES 100G Encryption AES 10G Encryption 1G 5G 5G 15G 40G 100G 19
20 Encryption over OTN Networks 1GbE & 10GbE Services FSP Network & Crypto Manager Site A Site B LAN OTN Network Carrier Managed Service LAN 1-8G FC n*1gbe, 10GbE STM-64c OTU-2e STM-64c OTU-2e 1-8G FC n*1gbe, 10GbE 5TCE-PCN+AES10G 5TCE-PCN+AES10G 20
21 Encryption Management & Operations 21
22 Data Center Networks Encryption Management for Private Networks Scenario 1 - User of encryption is the operator of equipment LAN FSP EM or LCT/CLI DCN FSP NM Server FSP NM Clients 3 rd Party NE 3 rd Party NE 3 rd Party NE Crypto Manager running on FSP NM 22
23 Data Center Networks Encryption Management for Private Networks Scenario 2 - Encryption user does not own the network LAN WWW. FSP NM Server FSP NM Clients GUI Server running NM client apps DCN Customer A 3 rd Party NE 3 rd Party NE 3 rd Party NE Crypto Manager running on GUI Server 23
24 Summary 24
25 Optical Transmission Security with Encryption Summary Encryption Solution Enables compliance with laws and regulations Effective security and protection for all information High bandwidth & 100% encrypted throughput Low-latency performance Superior scalability and agility on Layer 1 Encryption for both own enterprise networks and through operator managed service A complete and integrated solution leveraging advanced technology 25
26 Why? How valuable is your information to you? What is the cost to you IF the information end up in the wrong hands? Industry, Finance, Government, Healthcare, Easy insurance: Encrypt your Optical transmission! 26
27 Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright for the entire content of this presentation: ADVA Optical Networking.
LAYER 1 & LAYER 2 ENCRYPTION WHY: ONE SIZE DOES NOT FIT ALL
LAYER 1 & LAYER 2 ENCRYPTION WHY: ONE SIZE DOES NOT FIT ALL GIVEN ON 4/28/2015 Todd Bundy Director of Global Business Development ADVA Optical Networking [email protected] 203-546-8230 2015 Internet2
In-Flight Encryption. Jim Theodoras. Feb 2014
In-Flight Encryption Jim Theodoras Feb 2014 OSI Model 7 6 5 Top of Stack Application Presentation Session Data 4 Transport Layer TCP, UDP Segments 3 Network Layer IP/MPLS Packets 2 Data Link MAC Frames
Panel: The Future of Datacenter Networking Software-Defined Networking (SDN) for Datacenter Interconnect and Cloud Computing
Panel: The Future of Datacenter Networking Software-Defined Networking (SDN) for Datacenter Interconnect and Cloud Computing Achim Autenrieth HPSR 2012, Belgrade June 25 27, 2012 Evolution of cloud architectures
Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications
Marker Drivers and Requirements for Encryption and QKD in Enterprise Connectivity Applications Christian Illmer September 2009 ADVA Optical Networking ADVA is a leading global provider of xwdm optical
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM) Todd Bundy Director Business Development, ADVA Optical Networking [email protected] Our Students, Our Future Benjamin Carle
Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking - Real World Use Cases (Test bed at Marist/IBM) Our speakers today Todd Bundy Director Global Alliances, ADVA Optical Networking [email protected] Joe Weinman SVP, Cloud
High Speed Encryption Made in Germany
High Speed Encryption Made in Germany Today s Trends in Network Encryption 2 Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption
Data Center. Security A comprehensive approach to preventing, detecting and mitigating data security risks
Data Center Connect Security A comprehensive approach to preventing, detecting and mitigating data security risks Strategic White Paper Facing increased security threats and new regulations, enterprises
VPNC Interoperability Profile
StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN
Software Defined Optical Networks with Optical OpenFlow. Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1.
Software Defined Optical Networks with Optical OpenFlow Jörg-Peter Elbers, Achim Autenrieth ADVAnced Technology August 2012 Rev 1.0 Outline Software Defined Networks & OpenFlow Optical Domain Extensions
MJTS Conference. David Billington, March 2011
MJTS Conference David Billington, March 2011 Company Overview Our mission is to be the trusted partner for innovative Optical+Ethernet transport solutions that ADVANCE next-generation networks for data,
MPLS/SDN Intersections Next Generation Access Networks. Anthony Magee Advanced Technology ADVA Optical Networking MPLS & Ethernet World Congress 2013
MPLS/SDN Intersections Next Generation Access Networks Anthony Magee Advanced Technology ADVA Optical Networking MPLS & Ethernet World Congress 2013 Agenda Carrier Requirements Current & Future Software
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM)
Software Defined Networking Real World Use Cases (Test bed at Marist/IBM) Todd Bundy Director Business Development, ADVA Optical Networking [email protected] Our Students, Our Future Benjamin Carle
Consolidating Multiple Network Appliances
October 2010 Consolidating Multiple s Space and power are major concerns for enterprises and carriers. There is therefore focus on consolidating the number of physical servers in data centers. Application
Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA. Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE
Network Virtualization and SDN/OpenFlow for Optical Networks - EU Project OFELIA Achim Autenrieth, Jörg-Peter Elbers ADVA Optical Networking SE Networked Systems (NetSys) 2013 Stuttgart, 14.03.2013 Outline
Layer 2 Encryption Fortifying data transport
autumn meeting 2014 Layer 2 Encryption Fortifying data transport Christian Zank n Cube Optics AG n October 2, 2014 Need for Encryption? n 50.000 network intrusions detected every day Cisco 2013 n Data
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
Agenda. clock tower in old city of Neuchatel. 2014 ADVA Optical Networking. All rights reserved.
Time and Phase Delivery and Assurance for TD-LTE and LTE-A Gil Biran General Manager WSTS, June 2014, San Jose Agenda Delivering time and phase in Mobile Backhaul networks Addressing the LTE-A challenges
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.
L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
Communication Networks. We are securing the past in a fast moving future. FOX605 multiservice platform.
Communication Networks We are securing the past in a fast moving future. FOX605 multiservice platform. FOX605 Overview Operational networks of utilities demand real-time communication across the complete
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
ICAB5238B Build a highly secure firewall
ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this
Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall
Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall S2SVPN201102-02 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access
Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access 1 The Fundamentals of Passiv e Monitoring Access Copy right 2006 Net Optics, Inc. Agenda Goal: Present an overview of Tap
EnergyAxis System: Security for the Smart Grid
Security for the Smart Grid 2010 by Elster All rights reserved. No part of this document may be reproduced, transmitted, processed or recorded by any means or form, electronic, mechanical, photographic
HP FlexNetwork and IPv6
HP FlexNetwork and IPv6 Miha Petrač ESSN HP Networking presales 25.1.2012 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Magic Quadrant:
Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data
White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption
White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over
Interfaces and Payload Testing
application note 225 Packet Optical Transport Network Testing: From Commissioning to In-Service Monitoring Mai Abou-Shaban, Product Specialist, Transport and Datacom For network service providers considering
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES It is possible to consolidate multiple network appliances into a single server using intelligent flow distribution, data sharing and virtualization
Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15
Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15 Table of Contents Fully Integrated Hardware and Software
Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks
Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks Todd Bundy Director, Global Alliances-Enterprise ADVA Optical Networking [email protected] 203-746-8060 Connecting
Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )
Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.
DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN AGENDA 1. Key Feature learning's from ancient Greece? 2. User challenges to be addressed for IT, Data Centre and Cloud
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
between and U.S. CUSTOMS AND BORDER PROTECTION (CBP)
INTERCONNECTION SECURITY AGREEMENT between Your Company Name and U.S. CUSTOMS AND BORDER PROTECTION (CBP) MONTH, YEAR Full Company Name (including other legal names or d.b.a.* company names) Address City,
CSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
Hyper-V over SMB Remote File Storage support in Windows Server 8 Hyper-V. Jose Barreto Principal Program Manager Microsoft Corporation
Hyper-V over SMB Remote File Storage support in Windows Server 8 Hyper-V Jose Barreto Principal Program Manager Microsoft Corporation Agenda Hyper-V over SMB - Overview How to set it up Configuration Options
Virtual LAN Configuration Guide Version 9
Virtual LAN Configuration Guide Version 9 Document version 96-1.0-12/05/2009 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
The Metro Ethernet Network
The Metro Ethernet Network Comparison to Legacy SONET/SDH MANs for Metro Data Service Providers Revision 1.0 July 2003 Abstract This paper focuses on the results of a study commissioned by the MEF to quantify
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
High speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
CCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
Cisco SFS 7000D Series InfiniBand Server Switches
Q&A Cisco SFS 7000D Series InfiniBand Server Switches Q. What are the Cisco SFS 7000D Series InfiniBand switches? A. A. The Cisco SFS 7000D Series InfiniBand switches are a new series of high-performance
Operational Core Network
Service Assured Networking for Power Utilities Application Brochure Operational Core Network Using Carrier-Grade Ethernet Typical users: Transmission & Distribution Power Utilities For more than 30 years,
How To Get The Most Out Of A Pon From Commscope
Passive Optical Network (PON): Solutions for Federal Government Deployments Operational Efficiency Solutions Passive Optical Network (PON) solutions for federal government networks Discover opportunities
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC
SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC End-to-end Infrastructure Protection for Institutions In the last few years, the demand for classified information experienced by many government
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper
Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper The Small and Medium Business (SMB) Ethernet services market is creating huge access, value added
Network Monitoring - Fibre TAP Modules
Network Monitoring - Fibre TAP Modules It all started with. Bend insensitive MM fibre Smaller diameter cables Cable with tighter bend radius Less space in the DC, More organised cable management Greater
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Fiber-Optic Networks: Is Safety Just an Optical Illusion?
TECHNOLOGY ASSESSMENT Fiber-Optic Networks: Is Safety Just an Optical Illusion? Romain Fouchereau IDC OPINION Fiber-optic cable networks have been deemed the fastest, most reliable, and most secure way
NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance
NetTESTER Embedded 'Always-On' Testing & In-Service Performance Assurance Ethernet WAN Service: Typical Scenario HQ & Operations Centre (NOC) Management Access Management Access Site A Ethernet (Layer-2)
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Oracle Communications Network Discovery Overview. Updated June 2007
Oracle Communications Network Discovery Overview Updated June 2007 Oracle Communications Network Discovery Overview Oracle Communications Network Discovery provides automated discovery of the network including
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Intelligent, Functional and Effective Gateways for Small Business Applications
Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime
User Manual. Page 2 of 38
DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Secure Shell (SSH) Protocol
Vanguard Applications Ware IP and LAN Feature Protocols Secure Shell (SSH) Protocol Notice 2008 Vanguard Networks 25 Forbes Blvd. Foxboro, MA 02035 (508) 964-6200 All rights reserved Printed in U.S.A.
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
Business and enterprise cloud sync, backup and sharing solutions
Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
