We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byTrent Hathorn
Modified over 2 years ago
Maintenance Intelligence of Tomorrow IPS-CYBER SECURITY IT-S ECURITY RELATED TO IPS-SYSTEMS
E NCRYPTION 2© 2013 IPS GmbH
Encryption of whole hard disk Secured Containers Secured external devices (ex. USB-Flash Drives) Modern encryption technologies as AES and Twofish Multiple OS Support Possible performance loss of 10% up to 15% 3 E NCRYPTION © 2013 IPS GmbH
S/MIME 4© 2013 IPS GmbH
E-Mail signing E-Mail encryption Certificate based method Possible to identify sender Redirect e-mails not readable IPS supports S/MIME based e-mail transfer E-M AIL S IGNING AND E NCRYPTION WITH S/MIME 5© 2013 IPS GmbH
E NCRYPTED DATA TRANSFER 6© 2013 IPS GmbH
Encrypted file transfer minimize the risk of unauthorized access Man on the middle-attacks impossible Redirect to other server impossible because of certificate check IPS supports only TLS encrypted FTP access E NCRYPTED FTP T RANSFERS 7© 2013 IPS GmbH
D ATA E NCRYPTION 8© 2013 IPS GmbH
Pretty Good Privacy or GNU Privacy Guard Public Key / Private Key method (Keychain) Encryption with public key Decryption with private key IPS supports encrypted file transfer IPS PGP/GPG Key on IPS-Website: http://www.ips-energy.com/support/http://www.ips-energy.com/support/ PGP/GPG F ILE E NCRYPTION 9© 2013 IPS GmbH
PGP/GPG F ILE E NCRYPTION 10© 2013 IPS GmbH
S AVE D ATA T RANSFER B ETWEEN U NTRUSTED N ETWORKS 11© 2013 IPS GmbH
Two independent networks (domains): Office and Process Office network is connected to Internet Process network is highly isolated (no connection to Internet) There is no permanent connection between networks S AFE DATA TRANSFER BETWEEN UNTRUSTED NETWORKS 12© 2013 IPS GmbH
S YNCHRONIZATION SCHEMA © 2013 IPS GmbH
SQL Server Merge replication concept with mediator – republishing subscriber server in DMZ Office and Process network are never connected All connections between networks and DMZ are on demand Firewalls are configured for allowing only SQL server port (TCP 1433) Two stage synchronization process: In first step opens the connection between Office network and DMZ server and perform synchronization In second step opens the connection between DMZ server and Process network and perform synchronization S YNCHRONIZATION SCENARIO © 2013 IPS GmbH
www.ips-energy.com Maintenance Intelligence of Tomorrow © 2013 IPS GmbH15
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
TCP/IP is the communication protocol for the Internet TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services Harden Internetwork Connection Devices.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
DMZ (De-Militarized Zone)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
PGP Encryption Justin Shelby. Encryption Methods There are two basic key types for cryptography Symmetric Asymmetric.
Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Security fundamentals Topic 10 Securing the network perimeter.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Chapter 19 Security.
The Internet Unit Information Systems, Higher. The Internet HTML Two sets of notes.
New Data Regulation Law 201 CMR TJX Video.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
1 Firewalls Types of Firewalls Inspection Methods Static Packet Inspection Stateful Packet Inspection NAT Application Firewalls Firewall Architecture.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
CNT-150VT. Question #1 Your name Question #2 Your computer number ##
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
November 2006 TECO-WIS, Seoul 1 Definition of the Internet Network of networks –millions of smaller domestic, academic, business, and government networks.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
For further information computersecurity.wlu.ca
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
Troubleshooting Windows Vista Security Chapter 4.
Lectures and Practicals Mon 8-10 SC1222 TUE SC1222 Office: SC Website: mis.csit.sci.tsu.ac.th/kanida.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
© 2017 SlidePlayer.com Inc. All rights reserved.