We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTrent Hathorn
Modified over 2 years ago
Maintenance Intelligence of Tomorrow IPS-CYBER SECURITY IT-S ECURITY RELATED TO IPS-SYSTEMS
E NCRYPTION 2© 2013 IPS GmbH
Encryption of whole hard disk Secured Containers Secured external devices (ex. USB-Flash Drives) Modern encryption technologies as AES and Twofish Multiple OS Support Possible performance loss of 10% up to 15% 3 E NCRYPTION © 2013 IPS GmbH
S/MIME 4© 2013 IPS GmbH
signing encryption Certificate based method Possible to identify sender Redirect s not readable IPS supports S/MIME based transfer E-M AIL S IGNING AND E NCRYPTION WITH S/MIME 5© 2013 IPS GmbH
E NCRYPTED DATA TRANSFER 6© 2013 IPS GmbH
Encrypted file transfer minimize the risk of unauthorized access Man on the middle-attacks impossible Redirect to other server impossible because of certificate check IPS supports only TLS encrypted FTP access E NCRYPTED FTP T RANSFERS 7© 2013 IPS GmbH
D ATA E NCRYPTION 8© 2013 IPS GmbH
Pretty Good Privacy or GNU Privacy Guard Public Key / Private Key method (Keychain) Encryption with public key Decryption with private key IPS supports encrypted file transfer IPS PGP/GPG Key on IPS-Website: PGP/GPG F ILE E NCRYPTION 9© 2013 IPS GmbH
PGP/GPG F ILE E NCRYPTION 10© 2013 IPS GmbH
S AVE D ATA T RANSFER B ETWEEN U NTRUSTED N ETWORKS 11© 2013 IPS GmbH
Two independent networks (domains): Office and Process Office network is connected to Internet Process network is highly isolated (no connection to Internet) There is no permanent connection between networks S AFE DATA TRANSFER BETWEEN UNTRUSTED NETWORKS 12© 2013 IPS GmbH
S YNCHRONIZATION SCHEMA © 2013 IPS GmbH
SQL Server Merge replication concept with mediator – republishing subscriber server in DMZ Office and Process network are never connected All connections between networks and DMZ are on demand Firewalls are configured for allowing only SQL server port (TCP 1433) Two stage synchronization process: In first step opens the connection between Office network and DMZ server and perform synchronization In second step opens the connection between DMZ server and Process network and perform synchronization S YNCHRONIZATION SCENARIO © 2013 IPS GmbH
Maintenance Intelligence of Tomorrow © 2013 IPS GmbH15
CWSP Guide to Wireless Security Secure Wireless Transmissions.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Intrusion Detection and Intrusion Prevention.
Virtual Private Networks (VPNs) VPNs allow secure, remote, connections… but they don’t protect you from a compromised remote PC.
DMZ (De-Militarized Zone) Network Security. Privilege levels in Cisco routers Cisco IOS offers 16 privilege levels ◦ User Exec mode: Level 1 ◦ Privilege.
1 A Tutorial on Web Security for E-Commerce. 2 Web Concepts for E-Commerce Client/Server Applications Communication Channels TCP/IP.
Peer-to-peer and agent-based computing Security in Distributed Systems.
Network Security DMZ (De-Militarized Zone). J. Wang. Computer Network Security Theory and Practice. Springer 2008 General Framework.
Encrypting Wireless Data with VPN Techniques. Topics Objectives VPN Overview Common VPN Protocols Conclusion.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Legal Services National Technology Assistance Project.
12/01/ Protection of Information Assets (25%) 3. Protection of Information Assets 3. Protection of Information Assets (25%) Protecting Personal &
Copyright © 2003 Pearson Education, Inc. Slide 11-1.
Enabling Secure Internet Access with ISA Server. Enabling Secure Access to Internet Resources What Is Secure Access to Internet Resources? –Users can.
Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Public Key Infrastructure What can it do for you?.
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
The Internet Unit Information Systems, Higher. The Internet HTML Two sets of notes.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
BASICS OF IT FOR Health Information Managers Press Spacebar to advance slide.
Winter 2001 VoN Developers Conference -- January 24, 2001 SIP Proxies Jonathan Rosenberg Chief Scientist.
Chapter 10 Implementing Electronic Commerce Security Gary Schneider, 2003.
Wireless Connectivity at Pace University Wireless Connectivity is: Available at every Pace location Note: In NY 55 John St. & St. George have wireless.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 4: There’s more to it than RACF.
Keeping Laptops Secure: Solutions Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil Defense Team:
Version 4.1 CCNA Discovery 2– Chapter 7. Contents 7.1: ISP Services : TCP / IP Protocols 7.2: 7.3: DNS 7.3: 7.4: Application Layer Protocols 7.4.
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
© 2016 SlidePlayer.com Inc. All rights reserved.