Jeff's Crystal Ball, and theisco Extreme Network Infrastructure



Similar documents
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

Operating System Security

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

MAKING THE RIGHT CONNECTIONS

Network Security - ISA 656 Security

Online Backup by Mozy. Common Questions

Particularities of security design for wireless networks in small and medium business (SMB)

Roger s Cyber Security and Compliance Mini-Guide

Single Sign-On: Reviewing the Field

Canadian Access Federation: Trust Assertion Document (TAD)

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

How To Understand The History Of The Web (Web)

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

VPN Lesson 2: VPN Implementation. Summary

Internet Privacy Options

Apptix Online Backup by Mozy

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Wireless Network Best Practices for General User

Mobile Security. Policies, Standards, Frameworks, Guidelines

Using Wireless Technology Securely

White Paper: Managing Security on Mobile Phones

Canadian Access Federation: Trust Assertion Document (TAD)

CS Network Security: Public Key Infrastructure

SAML-Based SSO Solution

Getting FileMaker Server 11 and IIS 7.x to Work with SSL. By Todd Duell

How To Use Quantum Rbs Inc. Small Business Backup

Inspection of Encrypted HTTPS Traffic

Multi-Factor Authentication: Do I Need It, and How Do I Get Started? [And If I Do Need It, Why Aren't Folks Deploying It?]

CS Network Security: Public Key Infrastructure

Community Forum Agenda October 2012

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

Cisco Virtual Office Express

Electronic Data Security: Designing Good Data Protection Plans

The Case For Secure

Why VPN Alone Will not Secure your Wireless Network

Wireless Security and Health Care Information Systems

The Hidden Dangers of Public WiFi

What Are Certificates?

Wireless LAN Security In a Campus Environment

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

SAML-Based SSO Solution

Measure wireless network performance using testing tool iperf

Joe St Sauver, Ph.D. or Manager, InCommon Cer;ficate Program and Manager, Internet2 Na;onwide Security Programs

Identity Management. Critical Systems Laboratory

Securing an IP SAN. Application Brief

Federated Identity Management A Sevan White Paper

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================

Fig : Packet Filtering

Lucent VPN Firewall Security in x Wireless Networks

Seminar: Security Metrics in Cloud Computing ( se)

Basics of SSL Certification

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Wireless Intrusion Detection Systems (WIDS)

Using a VPN with CentraLine AX Systems

Advanced Configuration Administration Guide

Security and privacy in public WLAN networks

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Canadian Access Federation: Trust Assertion Document (TAD)

The increasing popularity of mobile devices is rapidly changing how and where we

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Steelcape Product Overview and Functional Description

Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux

Introduction to Computer Security

Setup Guide Access Manager Appliance 3.2 SP3

Owner of the content within this article is Written by Marc Grote

Executive Guide. Sponsored By:

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista

Canadian Access Federation: Trust Assertion Document (TAD)

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Security Considerations for DirectAccess Deployments. Whitepaper

Configuring Eduroam on Microsoft Windows Vista and 7 (all editions, 32 and 64 bits)

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Protocols. Packets. What's in an IP packet

Egress Switch Best Practice Security Guide V4.x

EasiShare Whitepaper - Empowering Your Mobile Workforce

E-Business, E-Commerce

Computer Security Literacy

Canadian Access Federation: Trust Assertion Document (TAD)

Security Best Practices for grades K-12

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Smart (and safe) Lighting:

Securing your business data in a wireless environment. Jamie Bodley-Scott Operations Manager - UK and Ireland

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

Sync Security and Privacy Brief

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

Security Overview Enterprise-Class Secure Mobile File Sharing

PRIVACY, SECURITY AND THE VOLLY SERVICE

Mobile multifactor security

Network Security - ISA 656 Review

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Working Together - Your Apple Mac and Microsoft Windows

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Replacing Sneaker Net with the Internet. DREXEL UNIVERSITY ischool INFO614 DISTRIBUTED COMPUTING & NETWORKING FINAL PROJECT

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

How to Turn a Laptop into a Wireless Hot Spot (Microsoft Windows XP)

Transcription:

Jeff's Crystal Ball (and other related matters) Jeffrey I. Schiller Information Services and Technology Page 1

Introduction Thank you for coming to a session where the agenda wasn't published! I'm going to do some crystal ball gazing And then discuss some of the problems (mostly security) that we face as we follow the smoke... Page 2

It's Time for Ubiquity! The network should be everywhere! People want it everywhere We have laptops, palmtops, PDAs and some even have network enabled clothing (uh oh, watch out for big brother ) Page 3

Wireless Everywhere Have to be careful, the word Wireless is used for everything from 802.11 through cell phones From high speed (aka 1Mb/sec) to really slow speed (SMS) WiMAX? Page 4

Fundamental Limitations The humans Are eyes are only so good and our hands are only so small! But all devices can benefit from high speed service Page 5

Drivers (Consumer) Most network applications can survive on modest bandwidth And then you get entertainment... Audio Video Entertainment will drive bandwidth requirements HD movies will drive the top end Page 6

Drivers (Research) Research market is tiny winy But important Real-time experiments generating vast amounts of data which needs to move globally Physics big consumer here Page 7

Wireless Deployment entrepreneurial newcomers vs. Entrenched Interests Newcomers: Gigabit access everywhere for free (or for a small fee) Entrenched Interests: High speed is 300Kb/sec and you get 600 free minutes a month... Big battle here Entrenched interests may loose, I hope so Page 8

Wireless (Data) Technologies 802.11(a/b/g): Here today, deployed on campus Independently owned hot spots. Some free some not campus and enterprise deployable No license needed EVDO: Cell system based Owned by few carriers Wide area Slower then 802.11, but faster then previous cell based tech. (300-900Kb/sec) Page 9

Wireless (Data) Technologies WiMAX: Similar to 802.11 technology, next generation licensed or unlicensed spectrum Probably over-broad term If you get a WiMAX card will it talk to all WiMAX networks? (I don't know) Big claim: Wide Area Coverage this implies licensed spectrum and carrier control Page 10

Prognosis We will continue to see a mixture of networking technologies 802.11(b/g/a) will continue to grow (there is the issue of which of the sub-standards g or a will dominate) [I have an a/b/g card!] WiMAX and EVDO are still works in progress For now, they provide a different service, for a different price Page 11

MIT's Network THIS IS NOT AN OFFICIAL IS&T STATEMENT!!! I see the network evolving into two or three different networks Commodity: What we use to get most of our work down This will primarily be a wireless network Will offer 10-100Mb/sec capability Research: For selected high speed needs Will not be ubiquitous on campus Will be separately cost recovered Page 12

Will we have an optical network? There are national initiatives to build an optical network Instead of an Internet Protocol network, you get a lambda to your destination Do whatever you want with it This is EXPENSIVE technology Not clear that it offers anything more beyond what could be offered by a high speed IP network Too early to tell if this is real Page 13

Security Privacy and the Internet Ubiquitous networking introduces some interesting security problem Can you trust the network? Simple answer: NO In the good ole days The network (phone) was and could be trusted Bad guys didn't in general have access to enough of it to matter The Internet, by contrast is an untrustable technology Page 14

Why no trust? There is no single administrative entity In general you do not know where your data is going or who has access to it. Wireless makes this worse Evil Twin Attack You cannot differentiate the good actors from the bad actors And there is a range between them! Page 15

Stupid Security WEP/WPA/802.1x They protect the wireless portion (which is good) But encryption ends at the access point, and you cannot trust the guy who runs that! Public Key Infrastructure (PKI) doesn't help Expect the PKI companies, who are hungry to start proposing their technologies as the answer (never mind the question) Airport Screeners: (Oops, wrong talk...) Page 16

Why PKI doesn't help Basic idea behind PKI is having Trust Anchors organizations that you trust You then get a certificate path from where you are to a trust anchor practical experience: This is notoriously hard to do On a global scale, one organization cannot declare who is trusted They can only declare who paid them $$$! PKI can bind an action to a name, but what does the name mean? Page 17

Example You go to the airport and open your laptop and associate with a local wireless network You discover that you have to register (read: pay) to use the network. The network claims to be owned by Airport Networks Unlimited Well who is that? Is that the airport officially, or the guy three chairs down with an access point in his briefcase whose purpose is to steal your credit card number?! Page 18

What can you do? Developers: Assume that the network is untrusted (because it is!) Develop applications that encryption all information from client to server Web based applications should use https URL's Although some subtlety is required, this isn't hard to do Page 19

What can you do? Users: Beware of http applications that ask for interesting information NEVER FILL OUT A FORM IN E-MAIL This is almost always a phishing attack Use the MIT VPN service to access MIT services, particularly when traveling more on this in a bit Use virtual credit cards Page 20

Virtual Credit Cards Some credit card companies offer these (AT&T Universal does) You get a one time use credit card from their website Obviously doesn't help if what you want it for is to pay for internet access, that you don't have yet! Page 21

VPN Virtual Private Network Sets up an encrypted tunnel through the public network Its like you are on MIT's network, even when you are not You do get a net 18 address You wind up with a direct path to a cleaner part of the MIT network Page 22

The network is not equal... There are dirty portions of the MIT network, and cleaner portions. Most building networks are dirty We have no idea what is connected to them, and anything can be turned into an eavesdropping box The Backbone is clean Only a limited number of things directly connected and we have control of them Server networks are mostly clean Page 23

More observations Federated Authentication is really needed But will it take off in time? Its SSL vs. SET all over again, but worse. Ad-hoc federation is already happening, and it is a security disaster waiting to happen! Example: IPASS and Education First You give your credentials (read: password) to foreign services to get access to resources Page 24

We have authentication technology Kerberos, X.509 certificates all have the feature that your password (or other secret) isn't sent over the network to prove your identity SAML (Security Assertion Markup Language) is a big help Foundation of Federated Identity Expedia Gets it right When ready, you will be able to safely authenticate without revealing your password Page 25

Too many federations now... Shibboleth, Liberty Alliance, whatever Microsoft is currently doing... All do the same thing, but differently! Everyone wants to be the infrastructure... so we all loose as the default is passwords again Page 26

Recent issues Too many cases of personal information being compromised Congress may get into the act PKI Companies are likely lobbying to make their technology required by law But it doesn't solve the problem Congress doesn't know that Page 27

Conclusions... Networking will be ubiquitous Wireless will likely be the medium Security, as always, isn't on par So we will go through some bad years security wise We will have to fix the security problems, or have them fixed for us. So is the glass half full (yeah, networking everywhere) or half empty (oops, my SSN everywhere...) Page 28