Maintenance Intelligence of Tomorrow IPS-CYBER SECURITY IT-S ECURITY RELATED TO IPS-SYSTEMS.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana.
The Internet Unit Information Systems, Higher. The Internet HTML Two sets of notes.
Network Security.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
DMZ (De-Militarized Zone)
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Chapter 19 Security.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
New Data Regulation Law 201 CMR TJX Video.
Vision/Benefits/Introduction Randy Armstrong (OPC Foundation)
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Troubleshooting Windows Vista Security Chapter 4.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Security SIG August 19, 2010 Justin C. Klein Keane
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
Chapter 5a - Pretty Good Privacy (PGP)
NAT、DHCP、Firewall、FTP、Proxy
Internet Business Associate v2.0
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Working at a Small-to-Medium Business or ISP – Chapter 7
CIW Lesson 7 Part A Name: _______________________________________
IS3230 Access Security Unit 9 PKI and Encryption
Working at a Small-to-Medium Business or ISP – Chapter 7
Sukumara T, Janne S, Kishan SG, Harish G, Eashwar / Presented to CIGRE Colloquium, Mysore, Cyber Security - Secure communication design for.
Working at a Small-to-Medium Business or ISP – Chapter 7
IS 4506 Server Configuration (HTTP Server)
The University of Adelaide, School of Computer Science
Protocols 2 Key Revision Points.
Cengage Learning: Computer Networking from LANs to WANs
Unit 8 Network Security.
Advanced Computer Networks
IS 4506 Configuring the FTP Service
Presentation transcript:

Maintenance Intelligence of Tomorrow IPS-CYBER SECURITY IT-S ECURITY RELATED TO IPS-SYSTEMS

E NCRYPTION 2© 2013 IPS GmbH

Encryption of whole hard disk Secured Containers Secured external devices (ex. USB-Flash Drives) Modern encryption technologies as AES and Twofish Multiple OS Support Possible performance loss of 10% up to 15% 3 E NCRYPTION © 2013 IPS GmbH

S/MIME 4© 2013 IPS GmbH

signing encryption Certificate based method Possible to identify sender Redirect s not readable IPS supports S/MIME based transfer E-M AIL S IGNING AND E NCRYPTION WITH S/MIME 5© 2013 IPS GmbH

E NCRYPTED DATA TRANSFER 6© 2013 IPS GmbH

Encrypted file transfer minimize the risk of unauthorized access Man on the middle-attacks impossible Redirect to other server impossible because of certificate check IPS supports only TLS encrypted FTP access E NCRYPTED FTP T RANSFERS 7© 2013 IPS GmbH

D ATA E NCRYPTION 8© 2013 IPS GmbH

Pretty Good Privacy or GNU Privacy Guard Public Key / Private Key method (Keychain) Encryption with public key Decryption with private key IPS supports encrypted file transfer IPS PGP/GPG Key on IPS-Website: PGP/GPG F ILE E NCRYPTION 9© 2013 IPS GmbH

PGP/GPG F ILE E NCRYPTION 10© 2013 IPS GmbH

S AVE D ATA T RANSFER B ETWEEN U NTRUSTED N ETWORKS 11© 2013 IPS GmbH

Two independent networks (domains): Office and Process Office network is connected to Internet Process network is highly isolated (no connection to Internet) There is no permanent connection between networks S AFE DATA TRANSFER BETWEEN UNTRUSTED NETWORKS 12© 2013 IPS GmbH

S YNCHRONIZATION SCHEMA © 2013 IPS GmbH

SQL Server Merge replication concept with mediator – republishing subscriber server in DMZ Office and Process network are never connected All connections between networks and DMZ are on demand Firewalls are configured for allowing only SQL server port (TCP 1433) Two stage synchronization process: In first step opens the connection between Office network and DMZ server and perform synchronization In second step opens the connection between DMZ server and Process network and perform synchronization S YNCHRONIZATION SCENARIO © 2013 IPS GmbH

Maintenance Intelligence of Tomorrow © 2013 IPS GmbH15