The Importance of Security Standards
|
|
|
- Moses Cannon
- 10 years ago
- Views:
Transcription
1 The Importance of Security Standards Presented by Douglas Kozlay Principal Engineer, Information Resource Engineering, Inc. Member: ANSI X9F INFORMATION RESOURCE ENGINEERING, INC.
2 The Importance of Security Standards Presented by Douglas Kozlay Principal Engineer, IRE Member: ANSI X9F In evaluating the many options for network security solutions, it is essential to understand and consider the role of security standards. The growth in distributed computing and the ensuing increase in computer crime has led to legislation and regulations that establish legal requirements for network and data security. The various ANSI, FIPS and ISO network security standards have undergone extensive peer review and represent the strongest security design thinking available in the commercial marketplace. Use of standards-compliant network security provides the best assurance of high quality, strong security for your network, conforming to legal requirements and standards of "due care." This white paper summarizes legal considerations and security standards, security services and standards, and considerations in the selection of standards. Legal Considerations There are now laws governing security of information in banking, corporate and government applications. The use of standards-based security is an important consideration in meeting legal requirements. In banking, there is very specific law requiring use of standards-compliant security. For example, use of standards-based systems protects banks against liability for electronic financial losses. The Uniform Commercial Code (UCC) provides legal standards for most types of financial transactions. Under UCC Section 4A-202: "...a payment order is effective as the order of the customer, whether or not authorized, if the security procedure is a commercially reasonable method of providing security against unauthorized payment orders. The liability for wire transfer losses is assigned by UCC4A as follows: If the bank follows a commercially reasonable security procedure as agreed to with its customers, the bank is not liable in the event of a loss during a fund transfer. If the bank accepts an unauthorized funds transfer without verifying it is in compliance with a security procedure, the loss falls on the bank. Commercially reasonable security standards have been defined by the international banking community through adoption of ANSI and ISO standards. These standards provide methods of data encryption, message authentication and user identification to protect against the risks encountered during electronic funds transfers. Use of the ANSI X9 standards, developed under the auspices of the American Banking Association, is the best way to assure "commercial reasonableness," the best protection against legal liability, and the best protection for data that is transmitted during funds transfers. In the corporate world, organizations and employees are required to meet their fiduciary responsibility by protecting assets, including information assets. Again, the use of standards-based security provides excellent evidence that "due care" has been exercised by employing methods endorsed by national, government and international standards bodies and in use by "similarly situated" corporations. In the Federal Government environment, compliance with FIPS (Federal Information Processing Standards) standards is a procurement requirement. FIPS are adopted and promulgated by the National Institute of Standards and Technology (NIST). Page 1
3 Security Standards Organization The following organizations set security standards for national and international network applications. ANSI - American National Standards Institute sets standards for the banking industry. FIPS - Federal Information Processing Standards. This organization sets standards for U.S. Government use. ISO/IEC - International Standards Organization and the International Electrotechnical Commission set international standards. IETF - Internet Engineering Task Force. This organization is responsible for setting standards for Internet users. Security Services Security services are used to achieve a desired business outcome. Business goals for network applications and the corresponding security services are: Business Goal Security Service Keep communications private Data Encryption Information that is received is exactly what was sent Authentication You are who you claim to be User Authentication Legally binding electronic transactions Digital Signatures The table below identifies the various areas of security standardization. It also illustrates the standards that are in common across the different standards bodies: Standards Security Service ANSI FIPS ISO/IEC IETF Data Encryption X3.92, FIPS 46, 8372, Standard X , 81 User Authentication X9.26 FIPS JJJ 9798, (draft) Message Authentication X9.9, FIPS 113, 9797, , 1827, 1828, 1852 X Key Management - Secret X9.17, X9.24 FIPS , Key Management - Public X9.42 (draft) , Oakley+ISAKMP (IPSEC drafts) The standard for automated key management, accepted worldwide, is ANSI X9.17/ISO DIS 8732/FIPS 171. This standard provides for secure automatic, periodic, electronic changes of encryption and authentication keys. ANSI X9.17/ISO DIS 8732/FIPS 171 has been formally reviewed and adopted by both standards organizations and the major users of commercial encryption technology, large banks and financial institutions. ANSI X9.17 is in use for applications such as: Electronic Funds Transfers Payment Authorization Automated Clearinghouse Transactions Secure Remote Access for users such as Auditors, Law Enforcement Agencies (FBI, Secret Service), Diplomats, Sales Organizations Securities Trading Public key management standards are now emerging, but have not yet been accepted. ANSI X9.42 and IETF Oakley+ISAKMP exist only in draft form and have not been approved through the peer review process. A working group of the IETF is revising the ISAKMP+Oakley draft (no RFC number is yet assigned) so that it may be proposed and formally adopted later in Page 2
4 Considerations in Selection of Standards There are considerations to review when selecting among the various standards. Over the years, most encryption algorithms and protocols have proven to be weaker than their designers thought. Cryptographers, as well as hackers, work diligently to find and exploit any weaknesses. Security standards have been investigated by committees of cryptographers and potential users; therefore, these standards tend to be more resistant to attack. Encryption Standards Data Encryption/Confidentiality (keeping communications private) - protects data from unauthorized disclosure. Data encryption is a process in which the data is "scrambled or coded" before it passes through the network. The information is decoded at the receiving location and read "in the clear." It is based on encryption algorithms such as the Data Encryption Standard (ANSI X3.92) or the Rivest- Shamir-Adleman (RSA) or IDEA algorithm. Encryption algorithms are the series of mathematical steps that are employed to transform data into encrypted form or are used to generate a Message Authentication Code (MAC). User Authentication - This is a process for identifying a user prior to initiating a secure session and/or randomly during the session (i.e., to make sure you are still talking to the same user). Standards in this area include ANSI X9.26 in the banking environment and Challenge Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP) in the Internet community. The CHAP and PAP are protocols for authenticating a user to a central hub/site when dialing into a network, but not end-to-end or a host. ANSI X9.26 is a challenge-response protocol that carries out the exchange using DES encryption. CHAP is based on a similar process using an algorithm called MD5. PAP is a weak authentication protocol lacking encryption and passing passwords in the clear. A draft Federal Information Processing Standards (FIPS) - currently called JJJ - is being made available by NIST to use the Digital Signature Standard for user authentication (X9.30). Message Authentication - ANSI X9.9 (based on DES) and FIPS JJJ are examples of authentication algorithms. These algorithms are a sort of cryptographic check sum - simply put, this is another way of authenticating data (not to be confused with an arithmetic checksum that is easily spoofed or impersonated). Non-Repudiation - This service is implemented using Digital Signatures. Two standards exist in this arena: DSS, the Digital Signature Standard (ANSI X9.30); and, RSA Signatures (ISO 9796). Digital signatures bind the user with the data file, providing both proof of data integrity and the origin of data that can be verified by any third party at any time. This function is critical for audit control in an electronic commerce environment. UCC-4A Similarly Situated Banks Consideration UCC-4A also states that an important factor in determining the security methods that are commercial reasonable method is the security method in use by similarly situated banks for similarly situated customers. With the rapid adoption of IRE Network Security Systems and similar systems by many banks across the U.S., a standard for commercially reasonable security is emerging. IRE products are used by 7 of the 10 largest U.S. banks and by 18 of the top 25 banks to secure EFTs. Internet Considerations As recently noted by security expert, Dr. Donn Parker of SRI, the standard that is emerging for network security in particular use of the Internet is the standard of "due care." That is, what approach is being used by similar organizations in similar situations for similar systems. Thus, the growing body of legislation and regulation is an indication of the dramatically increasing need to implement network security systems. Close adherence to national and international standards results in the best protection against threats to secure data communications. In addition, the use of systems that comply with these standards is the best protection against legal liability. Page 3
5 A Summary of IRE Experience in Financial Applications Citibank, North America has extensive experience with IRE systems. The Bank has use IRE network security systems since The products are used in numerous applications including the bank s corporate cash management, data processing and international communications operations. The Bank has provided over 1200 encryptors to Citibank corporate clients for use in securing electronic funds transfers. After a world-wide review of potential data security suppliers, Bank of Montreal selected IRE as its vendor of a data security system used to protect corporate cash management transactions in asynchronous dial networks and in an X.25 network. In 1989, the Bank was IRE s first client for System A.25 that provides encryption for host computers with X.25 interfaces. J.P. Morgan & Company selected IRE as the Bank s provider of security for corporate cash management applications. The Bank uses IRE s data encryption, message authentication and smartcard user authentication products to secure customer EFTs in Value-Added Networks including the GEIS store-and-forward network. To date, IRE has delivered over $500,000 of products to Morgan. Euroclear, the world s largest security clearinghouse, has begun deployment of IRE s Network Security System to over 1000 users in 35 countries. Euroclear requires the use of an IRE Remote Security Device by all users who perform funds transfers using the Euclid Cash service. IRE provides 24 hour support for this worldwide installation. Currently, approximately 800 security devices have been installed. The Chicago Clearing House Association and a consortium of 13 banks use IRE products to secure its EDIBANX service. EDIBANX is the first electronic service to provide true EDI with both payments and remittance information in one transaction. IRE products are used by a rapidly growing number of banks in electronic funds transfer applications. In addition to the financial institutions described earlier, First Union, PNC Bank, Northern Trust, Mellon Bank, Bank of New York, Wachovia Bank, State Street Bank, First National Bank of Maryland, First Bank, the Bank of Butterfield (Bermuda), La Caixa (Spain) and National City Corporation have installed IRE systems to secure corporate cash management, wire transfer, ACH and other EFT and remote access applications. The Federal Reserve System has selected the IRE AX400 and SafeNet/Dial Secure Modems to protect remote access by Bank Examiners to sensitive information located on LANs at Federal Reserve sites. This permits these employees to report their audit data while working from remote sites. The Internal Revenue Service selected IRE secure remote access products using advanced digital signature technology to enable remote access by agents who work from client sites, field offices and their homes. The IRE has publicly commented that they anticipate purchase of 10,000+ IRE secure modems. The IRS performed an extensive evaluation including two laboratory tests an a field trial by users of products from IRE and three other companies prior to choosing the IRE AX product family. The U.S. Department of the Treasury - Financial Management Service selected IRE to provide a Message and User Authentication System for the Service s Electronic Certification System. This security system is used to protect electronic payment invoices totaling approximately $4 Billion for all U.S. Government payments made by the Treasury Department. IRE has provided a smartcard-based authentication system that the Treasury Department and individual federal agencies use to electronically certify that the Treasury should process electronic payments of behalf of each agency. To date, IRE has delivered over $2M of products to FMS. Page 4
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Visa Inc. PIN Entry Device Requirements
Visa Inc. PIN Entry Device Requirements The following information is applicable for Visa Inc. regions. Visa Inc. regions include Asia-Pacific (AP); Central and Eastern Europe, Middle East and Africa (CEMEA);
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Guideline for Implementing Cryptography In the Federal Government
NIST Special Publication 800-21 [Second Edition] Guideline for Implementing Cryptography In the Federal Government Elaine B. Barker, William C. Barker, Annabelle Lee I N F O R M A T I O N S E C U R I T
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Security Policy. Security Policy. www.clickmeeting.com
Security Policy www.clickmeeting.com 1 Introduction ClickMeeting is a worldwide, solid and easy to use SaaS platform. It s core was constructed with the hi-end technology. Data security the highest priority
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY S OVERSIGHT OF THE TESTING
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY S OVERSIGHT OF THE TESTING AND CERTIFICATION OF ELECTRONIC HEALTH
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2
MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS
COMPLIANCE AND INDUSTRY REGULATIONS INTRODUCTION Multiple federal regulations exist today requiring government organizations to implement effective controls that ensure the security of their information
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Strengths and Weaknesses of Cybersecurity Standards
Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium [email protected] April 7, 2014 Bart Preneel 1 What is cybersecurity? Liddell and
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
LogMeIn HIPAA Considerations
LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
ELECTRONIC COMMERCE SYSTEMS
CHAPTER ELECTRONIC COMMERCE SYSTEMS This chapter discusses one of the most visible segments of the business world today e-commerce. In general terms, the issues involve the electronic processing and transmission
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
High speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
It s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
Digital Signatures The Law and Best Practices for Compliance. January 2014
Digital Signatures The Law and Best Practices for Compliance January 2014 Electronic/Digital Signature Legislation Disclaimer: ARX is not is not a law firm and does not provide legal advice. We make no
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
How To Get The Nist Report And Other Products For Free
National Institute of Standards and Technology (NIST) The Information Technology Lab Computer Security Division (893) Now What? What does NIST have for you to use and how do you get it? How do you contact
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Digital Signature Standard (DSS)
FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
Freescale Security Backgrounder Page 1
Freescale Security Backgrounder Page 1 Freescale Security Backgrounder Page 2 Table of Contents 1. Secure Internet Traffic: A Market Imperative 2. Overview of Network Security Technologies 3. Differences
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
