We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTrent Hathorn
Modified over 4 years ago
Maintenance Intelligence of Tomorrow IPS-CYBER SECURITY IT-S ECURITY RELATED TO IPS-SYSTEMS
E NCRYPTION 2© 2013 IPS GmbH
Encryption of whole hard disk Secured Containers Secured external devices (ex. USB-Flash Drives) Modern encryption technologies as AES and Twofish Multiple OS Support Possible performance loss of 10% up to 15% 3 E NCRYPTION © 2013 IPS GmbH
S/MIME 4© 2013 IPS GmbH
E-Mail signing E-Mail encryption Certificate based method Possible to identify sender Redirect e-mails not readable IPS supports S/MIME based e-mail transfer E-M AIL S IGNING AND E NCRYPTION WITH S/MIME 5© 2013 IPS GmbH
E NCRYPTED DATA TRANSFER 6© 2013 IPS GmbH
Encrypted file transfer minimize the risk of unauthorized access Man on the middle-attacks impossible Redirect to other server impossible because of certificate check IPS supports only TLS encrypted FTP access E NCRYPTED FTP T RANSFERS 7© 2013 IPS GmbH
D ATA E NCRYPTION 8© 2013 IPS GmbH
Pretty Good Privacy or GNU Privacy Guard Public Key / Private Key method (Keychain) Encryption with public key Decryption with private key IPS supports encrypted file transfer IPS PGP/GPG Key on IPS-Website: http://www.ips-energy.com/support/http://www.ips-energy.com/support/ PGP/GPG F ILE E NCRYPTION 9© 2013 IPS GmbH
PGP/GPG F ILE E NCRYPTION 10© 2013 IPS GmbH
S AVE D ATA T RANSFER B ETWEEN U NTRUSTED N ETWORKS 11© 2013 IPS GmbH
Two independent networks (domains): Office and Process Office network is connected to Internet Process network is highly isolated (no connection to Internet) There is no permanent connection between networks S AFE DATA TRANSFER BETWEEN UNTRUSTED NETWORKS 12© 2013 IPS GmbH
S YNCHRONIZATION SCHEMA © 2013 IPS GmbH
SQL Server Merge replication concept with mediator – republishing subscriber server in DMZ Office and Process network are never connected All connections between networks and DMZ are on demand Firewalls are configured for allowing only SQL server port (TCP 1433) Two stage synchronization process: In first step opens the connection between Office network and DMZ server and perform synchronization In second step opens the connection between DMZ server and Process network and perform synchronization S YNCHRONIZATION SCENARIO © 2013 IPS GmbH
www.ips-energy.com Maintenance Intelligence of Tomorrow © 2013 IPS GmbH15
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana.
The Internet Unit Information Systems, Higher. The Internet HTML Two sets of notes.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
November 2006 TECO-WIS, Seoul 1 Definition of the Internet Network of networks –millions of smaller domestic, academic, business, and government networks.
DMZ (De-Militarized Zone)
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
For further information computersecurity.wlu.ca
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Chapter 19 Security.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
© 2018 SlidePlayer.com Inc. All rights reserved.