Open Text Secure Shell
|
|
|
- Claire Greer
- 10 years ago
- Views:
Transcription
1 Open Text Secure Shell Securing Open Text Exceed Open Text Connectivity Solutions Group Abstract Security concerns continue to receive unprecedented focus from organizations around the globe, and the cost of security breaches has proven to be financially crippling for many organizations. The need to secure sensitive data is paramount. Industry-specific security standards and government regulations are also prompting organizations to review and improve their current security infrastructures and policies. The search for a comprehensive security solution from a trust-worthy vendor is on, and Open Text Secure Shell is that solution. Open Text Secure Shell is FIPS validated and can be used to ensure that all your X Window sessions are encrypted and secure.
2 2 Securing Open Text Exceed W hite Paper Contents The Security Challenge... 3 Driving Security... 4 Structural Factors... 4 External Factors... 4 Connectivity A Definition... 5 X Window (or X11)... 5 Telnet... 5 FTP... 5 Security Risks in a Connectivity World... 6 Weak Authentication... 6 Easy Protocol Decoding... 6 Data Authenticity and Integrity Tampering... 6 Solutions for Secured Connectivity... 7 SSL... 7 Kerberos... 7 Secure Shell... 8 How to Secure Exceed... 9 Host Based Security... 9 User Based Security... 9 Open Text Secure Shell... 9 Implementation Securing X Connections X11 Forwarding X11 Forwarding In Depth XDMCP Securing Telnet SFTP File Transfer Secure Shell Management Console Certificates and Keys... 14
3 3 Securing Open Text Exceed W hite Paper The Security Challenge Security is a hot topic today. Although, companies have been slow to recognize the importance of security, things have changed during the last decade. Security is a top priority and there are no indications that this will end any time soon. The costs of security (or lack thereof) have now been clearly identified, and the picture does not look very good. The CSI (Computer Security Institute), in partnership with the FBI (Federal Bureau of Investigation), releases a Computer Crime and Security Survey every year. This survey is one of the longest-running surveys in the information security field and definitely one of its most relevant. The survey document is available from the CSI Website ( In 2009, Respondents reported big jumps in incidence of password sniffing, financial fraud, and malware infection. One-third of respondents' organizations were fraudulently represented as the sender of a phishing message. Average losses due to security incidents are down again this year (from $289,000 per respondent to $234,244 per respondent), though they are still above 2006 figures. Twenty-five percent of respondents felt that over 60 percent of their financial losses were due to non-malicious actions by insiders.
4 4 Securing Open Text Exceed W hite Paper Driving Security Beyond the potential for significant financial damages, many other factors are urging companies to investigate, purchase and deploy security technologies. Structural Factors Inability to run operations without IT infrastructures. IT framework downtime impacts revenue and profit. Integrity of information is essential to accomplish daily operations and require mutual trust. Theft of proprietary information can mean life or death situations for companies. Businesses are becoming more and more interconnected. How many transactions per day are performed through electronic data exchange? Exposure to the outside world. External Factors Our world has become more security conscious. Amid heightened concerns for national security, every individual has fully realized that safety has been redefined. Massive IT attacks (Code Red, Nimda, Sobig ) have had a worldwide impact and prompted media attention. Because we live in an interconnected world, the security of IT infrastructure is not an expert reserved domain any longer. Proliferation of standards and legislations with direct or indirect impact on Security: since 2001, numerous initiatives have been taken by the government that directly impact security policies of public and private organizations (e.g. The Patriot Act, Sarbanes-Oxley and HIPAA). Threat of legal liability by customers and/or partners. Organizations and software vendors are being held to a higher degree of accountability for security, if not in the courtroom, then by their customers. Organizations are challenged to prove they are managing security at a level that will satisfy their business partners and stakeholders. This goes beyond discussing what security products are installed, to communicating compliance and management practices of information security.
5 5 Securing Open Text Exceed W hite Paper Connectivity A Definition Connectivity is a domain where network communications are paramount. In its broader sense, Connectivity can be defined as the group of technologies that allow multiple systems (heterogeneous or not) to communicate. In a more popular sense, Connectivity designates TCP/IP client server technologies working with standardized protocols which allow systems to interconnect and exchange information. Some of the most popular Connectivity technologies is: X Window (or X11) X Window (or X11) is a windowing and graphic system developed at MIT. Almost all UNIX graphic applications are X Window based. One of X Window most notable properties is its ability to separate the application processing layer, the logic, from its graphic layer, the user interface, which can be deployed on a remote machine. Telnet Telnet is a protocol for remote computing on a network. It allows a computer to act as a remote terminal on another machine, anywhere on the network. The remote computer (also called the telnet server) accepts input directly from the client computer\and output for the client session is directed to the client screen. Many other protocols such as TN3270 (Mainframe) or TN5250 (AS/400) are derived from Telnet FTP File Transfer Protocol, is a protocol for exchanging files over a network. FTP is most commonly used to download a file from a server, or to upload a file to a server using a network.
6 6 Securing Open Text Exceed W hite Paper Security Risks in a Connectivity World Although some connectivity protocols have been in use for more than a quarter century, very few of them come with a strong security model. Inherent security flaws exist in almost every connectivity protocol and many organizations do not realize how vulnerable they are to these security issues. Weak Authentication As surprising as it may seem, many protocols, such as Telnet and FTP, send their messages in clear text over the network. Such messages include username and passwords, as well as all other information displayed to the user during the session. Widely available network sniffing tools allow any attacker to easily capture that information and use it for their own profit Easy Protocol Decoding Although X Window does not transmit user s input as a string of text to the X application, the protocol remains relatively easy to decode in order to retrieve the desired information. Keyboard inputs are transmitted in clear-text as numbers which can be easily obtained and interpreted to rebuild the original text that was entered by the user. Access to password protected X applications can be compromised by anybody with a network sniffing tool and a little bit of patience Data Authenticity and Integrity Tampering The Man in the Middle attack, or TCP hijacking, is well known attack where an attacker sniffs packets from the network modifies them and inserts them back into the network. Sensitive information can be intercepted and altered without a chance for the victim to know that their data has been tampered with. Although this attack requires a superior level of skills than those required for simply sniffing a network, some program/code sources are available on the internet for the enterprising hijacker. Because of their widespread usage throughout organizations, connectivity software is a target of choice. Their popularity does not allow companies to simply remove and replace them with more secure technologies without significant investment. The solution to this problem lies in applying robust security techniques to existing connectivity protocols.
7 7 Securing Open Text Exceed W hite Paper Solutions for Secured Connectivity Given that connectivity protocols are still going to be around for a significant number of years, it becomes mandatory for organizations to implement complementary security solutions that can be built on top of their existing infrastructure. Some of those solutions consist of building encryption and authentication within the network hardware. Although it sounds like an interesting way of increasing the security level of the network, such a solution is very expensive and involves significant disruption of the business operations. Another solution consists in building a security layer within the existing protocols. High effectiveness, minimal business disruption and relatively low investments are some of the characteristics that have led many organizations to choose this path. SSL SSL (Secure Sockets Layer) is a protocol which allows for the encryption of data transmitted between two computers. It was developed in the mid-90s by Netscape to facilitate the transmission of sensitive information via the Internet. Since then, it has been built into all major browsers and web servers and is the industry standard for protecting information sent over the Internet. SSL uses public and private keys. There are two strengths of SSL, 40-bit and 128-bit. The bits indicate the length of the session key the longer the session key, the harder it is to crack the code. When a client wants to connect to a server using SSL, the client and the server go through a series of requests and acknowledgements ( the SSL handshake ). SSL is used to secure a wide variety of protocols and has been adopted by a large number of organizations. As an example, SSL has become the de facto security standard for Mainframe and AS/400 connectivity through the TN3270 and TN5250 protocols. It s also widely used to secure HTTP connections and many 3rd party protocols. Kerberos Kerberos is a trusted third-party authentication mechanism. It is trusted in the sense that each of its clients believes Kerberos judgment as to the identity of each of its other clients to be accurate. Kerberos keeps a database of clients and their private keys. The private key is a large number known only to Kerberos and the client to which it belongs. In the case that the client is a user, it is an encrypted password. Network services requiring authentication register with Kerberos, as do clients wishing to use those services. Microsoft introduced operating system level support for Kerberos in Windows Although interoperability between a classic Kerberos environment and its Microsoft counterpart was somehow challenging at the beginning, the two environments can now work seamlessly together. Many companies are considering using Kerberos as their primary authentication mechanism, now that it can be used from the Windows environment. A Microsoft Windows server can easily become a
8 8 Securing Open Text Exceed W hite Paper Kerberos domain controller and thus serve as an authentication trusted tier for all third party authentication needs. Another factor that speaks to Kerberos is its ability to be used as part of a much wider security implementation. The Secure Shell protocol for instance, which provides authentication and encryption services, can use Kerberos as one of its authentication methods. Secure Shell The Secure Shell protocol was created in 1995 by a young Finnish student named Tatu Ylönen after he was victim of a password-sniffing attack. In 1999, OpenBSD shipped with OpenSSH, a derivative of the original free SSH which also supports the Secure Shell 2 protocol. The Secure Shell protocol offers numerous answers to security issues among which: It offers strong security against cryptanalysis and protocol attacks It provides support for key and certificate management infrastructures It can work in conjunction with existing certificate infrastructure if available It is relatively easy to deploy and can be made easy-to-use It does not require in-depth security knowledge from the user and can work transparently behind-the-covers.
9 9 Securing Open Text Exceed W hite Paper How to Secure Exceed In the past, the main concerns regarding security revolved around the ability to display to the Exceed X server. There were 2 ways to control access: Host Based and User based. Host Based Security Either of these methods can be used with Exceed and are configured under Xconfig Security, Access Control and System Administration. With Host Access Control, you decide which UNIX hosts clients will be able to display to the Exceed X server. If a host is not in this list it will get a message that it is unable to display to Exceed. User Based Security With User based control, access is based upon a security token known as a magic cookie. In this case, the token is kept in the users UNIX home directory and is also copied to the PC running Exceed. The two are then compared and if they are not identical, display to Exceed is rejected. These security mechanisms do not take into account that any credentials and data are still sent over the network in clear text. Although password complexity rules have increased, passwords are often easily cracked. A study by The University of Wyoming says that it will take over 800 years to crack a 9 character password made up of upper and lower case letters. However anyone snooping on the network with a packet trace utility can still see it in the clear. These are some of the reasons that SSH was developed. Open Text Secure Shell Open Text Secure Shell is an add-on to a wide selection of Open Text Connectivity Solutions, including Open Text Exceed, Exceed PowerSuite, Open Text HostExplorer, HostExplorer FTP and Open Text NFS Client, as well as any third-party network applications. It can seamlessly encrypt network traffic generated by applications in compliance with industry regulations, such as FIPS As a tightly integrated add-on component for Open Text Connectivity Solutions, it offers great transparency to end users, affecting neither their workflow nor productivity. Open Text Secure Shell provides Secure Shell 2 (SSH), Secure Sockets Layer (SSL) & TLS, LIPKEY, and Kerberos security mechanisms to ensure security for communication types such as X11, NFS, terminal emulation (Telnet), FTP and any TCP/IP protocol.
10 10 Securing Open Text Exceed W hite Paper Open Text Secure Shell offers a very flexible infrastructure allowing the protocol to evolve as new authentication methods are invented. Current supported authentication methods include: Username/Password Certificate and Keys Keyboard Interactive Open Text or MIT Kerberos Microsoft Kerberos (Active Directory) Multiple Authentications Regardless of what you choose you can relax knowing that all your data and credentials will be secure from intrusion. Additional features include: Extensive ability to configure the protocol settings. Choice among several strong encryption algorithms including AES. Choice among several key exchange algorithms. FIPS validated cryptographic module. Choice of several Message Authentication Code (MAC) algorithms to ensure data integrity. Support for Agent forwarding for remote authentication. Ability to automatically or manually select the X11 port settings. Configurable tunnel parameters such as window size, connection timeout, compression values, and trace level.
11 11 Securing Open Text Exceed W hite Paper Implementation Open Text Secure Shell is a Secure Shell 2 client application. With it, you configure and start Secure Shell sessions that you can use to secure otherwise unsecured communications. A Secure Shell session, or tunnel, is an authenticated and encrypted SSH2 connection initiated from a Secure Shell client to a host on the network that is running a Secure Shell server. During the initial negotiation of this connection, both the server and client are authenticated. Server authentication is performed initially using public key exchange, and a number of authentication methods are supported for client authentication. Once the tunnel is established, the information channeled through it is encrypted using any of a number of supported encryption ciphers including Blowfish, 3DES, CAST128, and the U.S. Advanced Encryption Standard (AES). The following scenarios describe different implementations of Secure Shell. Securing X Connections Securing X connections are more complex than with other protocols or services. However it is important to understand how it works so that you know where to look if troubleshooting is required. Securing an X Window session requires that you create an Xstart profile that specifies Secure Shell as the startup method. The Connection parameters you specify in Xstart are used to establish a Secure Shell tunnel to the target host. With Xstart you can encrypt your login credentials or your entire session and be sure that all your data is safe from unwanted intrusions. X11 Forwarding You can secure X Window sessions initiated with HostExplorer or Xstart. When using Xstart, X11 forwarding is enabled by default, whereas with HostExplorer you need to ensure X11 is enabled in your profile. Enabling X11 forwarding within HostExplorer instructs the secure shell server to forward X applications, started from a HostExplorer session, from the host to your local machine through the secure shell tunnel created by the HostExplorer session. When you start a tunnel where X11 port forwarding is enabled, the Open Text Secure Shell engine requests X forwarding when connecting to the Secure Shell server. If the server supports X forwarding, it runs an X11 proxy on the remote host. The $DISPLAY variable is configured by the remote Secure Shell server so that initiated X applications connect to the X11 proxy, which sends the connection through the tunnel. What is displayed on your desktop is a secure session.
12 12 Securing Open Text Exceed W hite Paper X11 Forwarding In Depth The secure shell client sends out a request for a secure shell connection. The secure shell daemon gets the request and then spawns another sub-daemon to take care of this new secure connection. Unlike a regular telnet connection, where the user sets the DISPLAY on the command line, the ssh daemon takes care of this and sets the display. This is part of how X11 forwarding works as previously explained. In addition to setting the display it also creates an authentication token known as a magic cookie by running a program called Xauth. From a firewall perspective you only have to open outbound port 22. When the connection is requested with X11 forwarding, the ssh daemon spawns a subdaemon to handle the display. Upon the first connection, the host identifies itself with a key or fingerprint. In a UNIX environment, this is kept in the known_hosts file. With Open Text Secure Shell, it is kept in a repository. The client and the server exchange a list of supported algorithms and then agree on one. An authentication token is generated by Xauth and stored in the user s.xauthority file. The X client is displayed to this proxy X server and then everything is sent securely to Exceed for displaying on the local workstation. Since ssh is a client/server environment, both sides must have X11 forwarding enabled. Since the main purpose of Xstart is to launch X clients, this is implicitly enabled. However it is important to ensure that the ssh daemon has it enabled as well or the connection will fail. XDMCP Most UNIX users are familiar with the CDE, Gnome or KDE desktop environments; however, it is not possible to secure XDM connections. Secure Shell only secures TCP/IP connections and XDMCP uses UDP/IP. A simple way around this is to launch Xsession, dtsession, gnome-session or startkde from the Xstart command line. These are the different script files that ultimately invoke the respective desktop environments. This will provide the UNIX desktop with the added benefit of knowing that your session and data are encrypted and protected.
13 13 Securing Open Text Exceed W hite Paper Securing Telnet When you install Open Text Secure Shell alongside HostExplorer, you gain the option of creating Secure Shell-enabled HostExplorer VT session profiles. You can then use these session profiles to start secure VT sessions, which use the Secure Shell protocol instead of using unsecured Telnet connections. Securing a HostExplorer VT session requires that you create a VT session profile in HostExplorer that specifies one of the Secure Shell connection types. Each of the Secure Shell options also specifies an authentication type. You must provide the connection and authentication parameters necessary to establish a Secure Shell connection to the target host. For more control over tunnel settings, you also have the option of specifying a custom Open Text Secure Shell tunnel profile. The settings are then read from the tunnel profile to the HostExplorer session profile. Open Text Secure Shell tunnel profiles contain all the parameters necessary to start and configure a Secure Shell tunnel. When you create your HostExplorer profile, you can configure it to load the necessary connection parameters from the tunnel profile of your choice. You can create tunnel profiles with Open Text Secure Shell, and then select the tunnel to be used for your VT session, or you can create them when you configure your HostExplorer VT session profile. SFTP File Transfer SFTP or SSH File Transfer Protocol is a network protocol that provides rich file transfer and manipulation capabilities over an SSH2 connection. The Open Text Secure Shell implementation of the SSH2 protocol includes SFTP support for HostExplorer FTP and FTP Classic, and an scp2 command line tool. After SFTP connections are established, the files you send and retrieve move securely between the client and the host s Secure Shell server. When you configure an FTP profile to use Secure Shell, all parameters used to establish the Secure Shell tunnel are stored in the FTP profile. Instead of specifying the connection parameters explicitly when you create a Secure Shell-enabled FTP session profile, you also have the option of specifying these parameters by associating a tunnel profile with your FTP profile. Tunnel profiles contain all the connection parameters needed to establish the Secure Shell tunnel to the remote host. You can also do a combination of both. That is, in the FTP profile, you can specify a tunnel profile from which to load the necessary parameters. Then, in the same FTP profile, you can specify and save parameters that override some of those loaded from the specified tunnel profile.
14 14 Securing Open Text Exceed W hite Paper Secure Shell Management Console The Open Text Secure Shell Management Console is used to view, configure and establish Secure Shell tunnel connections. The Console is what provides the ability to fine-tune your secure shell settings. This is where encryption algorithms can be selected, different authentication methods can be configured and various secure tunnels to your various hosts can be created. The console assists in managing, monitoring, and troubleshooting your connections. Certificates and Keys You can use Open Text Secure Shell Management Console or the Certificates and Keys Management Console to manage keys and certificates that reside in the key stores. The console lets you manage keys and certificates for use with Secure Shell and SSL connections initiated with the various Connectivity Solutions. You can perform the following tasks; view information about your keys about your certificates, view certificate authorities, generate user keys, generate certificate requests, generate self-signed certificates, import and export keys and certificates.
15 15 Securing Open Text Exceed W hite Paper About Open Text Connectivity Solutions Group Open Text's leading Connectivity Solutions connect people, data and applications in mission-critical environments through a complete line of remote application access and data integration solutions. With 90 percent of Global 2000 companies relying on its award-winning solutions for over 20 years, Open Text understands the financial and operational challenges that most organizations face, whether they are multiple systems, disparate data sources, or geographically dispersed teams. About Open Text Open Text is a leader in Enterprise Content Management (ECM). With two decades of experience helping organizations overcome the challenges associated with managing and gaining the true value of their business content, Open Text stands unmatched in the market. Together with our customers and partners, we are truly The Content Experts, supporting 46,000 organizations and millions of users in 114 countries around the globe. We know how organizations work. We have a keen understanding of how content flows throughout an enterprise, and of the business challenges that organizations face today. It is this knowledge that gives us our unique ability to develop the richest array of tailored content management applications and solutions in the industry. Our unique and collaborative approach helps us provide guidance so that our customers can effectively address business challenges and leverage content to drive growth, mitigate risk, increase brand equity, automate processes, manage compliance, and generate competitive advantage. Organizations can trust the management of their vital business content to Open Text, The Content Experts. connectivity.opentext.com Sales: Support: [[email protected]] [ Worldwide] [ North America] [[email protected]] [ Worldwide] [ North America] www. o p e n text.com For more information about Open Text products and services, visit Open Text is a publicly traded company on both NASDAQ (OTEX) and the TSX (OTC). Copyright 2009 by Open Text Corporation. Open Text and The Content Experts are trademarks or registered trademarks of Open Text Corporation. This list is not exhaustive. All other trademarks or registered trademarks are the property of their respective owners. All rights reserved.
Evolution from FTP to Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Evolution from FTP to Secure File Transfer www.ipswitchft.com Do you know where your organization s confidential and sensitive files were transferred today? Are you sure
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
TELE 301 Network Management. Lecture 16: Remote Terminal Services
TELE 301 Network Management Lecture 16: Remote Terminal Services Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus Remote Terminal Services
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
An Overview of the Secure Shell (SSH)
White Paper An Overview of the Secure Shell (SSH) 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Overview of Secure Shell... 2 Introduction to Secure Shell... 2
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Open Text Connectivity 14
Open Text Connectivity 14 Introducing the First Connectivity Solutions Suite Compatible With Windows 7 Open Text Connectivity Solutions Group November 2009 2 W hite Paper Contents Re-introducing Connectivity...
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
visionapp Remote Desktop 2010 (vrd 2010)
visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
The Architecture Overview
The Architecture Overview OpenText Exceed ondemand Managed Application Access Solutions for Enterprise OpenText Connectivity Solutions Group February 2011 Abstract Exceed ondemand is a software solution
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Securing Network Print Jobs
White Paper - Levi, Ray & Shoup, Inc. Securing Network Print Jobs Enterprise Output Management Series LRS White Paper 2002 Levi, Ray & Shoup, Inc. All rights reserved. LRS, VPS, and are registered trademarks
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Reduce Costs and Improve Efficiency by Automating Oracle Document Distribution. Open Text Fax and Document Distribution Group October 2009
Reduce Costs and Improve Efficiency by Automating Oracle Document Distribution Open Text Fax and Document Distribution Group October 2009 2 White Paper Contents Introduction...3 The Challenge: Efficiently
2006 Attachmate Corporation. All rights reserved. USA Patents Pending.
2006 Attachmate Corporation. All rights reserved. USA Patents Pending. The fonts distributed with Reflection X software are included free of charge. Some of the fonts were donated to X Window development
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
The ABCs of KVMs: How Remote KVM Switches Put You in Control of Your Data Center
How Remote KVM Switches Put You in Control of Your Data Center Lantronix, Inc. 15353 Barranca Parkway Irvine, CA 92618 Tel: +1 (800) 422-7055 Fax: +1 (949) 450-7232 www.lantronix.com Contents Introduction...
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely
Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
BeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
Compliance in the Corporate World
Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions
LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
WebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Domain 6.0: Network Security
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 6.0: Network Security Chapter 6 6.1 Explain the function of hardware and software security devices Network based firewall, Host based firewall
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Secure File Transfer with SSH
White Paper Secure File Transfer with SSH 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Data delivery over the Internet can be simple, convenient, and costeffective
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Understanding Secure Shell Host Keys
Understanding Secure Shell Host Keys White Paper 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Understanding Host Keys Think about the last time you faxed personal
LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS
LAB FORWARD WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS Medical diagnostics are a vital part of the modern healthcare system, and instrument uptime is critical
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Secure Remote Control Security Features for Enterprise Remote Access and Control
Secure Remote Control Security Features for Enterprise Remote Access and Control Good communication is vital to any company, large or small. Many departments within companies are utilizing different platforms
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
RELEASE NOTES. Release Notes. Introduction. Platform. Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.
Release Notes Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.00 (2012027) Shipping date: RELEASE NOTES 30 th January 2012 Introduction These release notes contain information relating
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Reflection X Advantage Help. Date
Reflection X Advantage Help Date Copyrights and Notices Attachmate Reflection 2015 Copyright 2015 Attachmate Corporation. All rights reserved. No part of the documentation materials accompanying this Attachmate
MIKOGO SECURITY DOCUMENT
MIKOGO SECURITY DOCUMENT Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: [email protected] Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: [email protected] Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
