All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
All rights reserved © 2005, Alcatel Distributed Storage Networks  Dr. Stephan Rupp 
Password?. Project CLASP: Common Login and Access rights across Services Plan
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Corporate Information Systems Delivery of Infrastructure IT Services.
BUSINESS B1 Information Security.
Internet Security for Small & Medium Business Week 6
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Security considerations for mobile devices in GoRTT
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
TESTING as a SERVICE An Emitac Enterprise Solutions offering that can be offered on CLOUD as well.
Vasilis Katos Securing your business data in a wireless environment.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Building a Fully Trusted Authentication Environment
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks PASSTORE: safe certs & password management.
Best-in-Class Productivity for the Modern SMB Office solutions when and where you need them with Microsoft Office 365. Belston Technologies is a Certified.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Safe’n’Sec IT security solutions for enterprises of any size.
CPT 123 Internet Skills Class Notes Internet Security Session B.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Computer Security Sample security policy Dr Alexei Vernitski.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Data and database administration
Identity & Access Management
Install AD Certificate Services
In the attack index…what number is your Company?
Security Insights: Secure Messaging
Presentation transcript:

All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp

All rights reserved © 2005, Alcatel Page  Traditional Concepts to protect Enterprise IT  Users mix up private and business infrastructure  User acceptance = a low threshold for security measures  Outlook Risk Awareness in Enterprise IT

All rights reserved © 2005, Alcatel Page Concepts to protect Enterprise IT Enterprise IT Public Network Controlled Access

All rights reserved © 2005, Alcatel Page  Traditional Concepts to protect Enterprise IT  Users mix up private and business infrastructure  User acceptance = a low threshold for security measures  Outlook Risk Awareness in Enterprise IT

All rights reserved © 2005, Alcatel Page Mobile devices bypass protection ? So what? Mobile Devices

All rights reserved © 2005, Alcatel Page Mobile devices require new concepts  Risks:  > loss of corporate data outside enterprise IT  > malicious intruders inside enterprise IT  Measures:  > define, publish and enforce an IT policy  > encrypt data on mobile devices  > manage any device that connects to enterprise IT  however: will users accept it? 

All rights reserved © 2005, Alcatel Page  Traditional Concepts to protect Enterprise IT  Users mix up private and business infrastructure  User acceptance = a low threshold for security measures  Outlook Risk Awareness in Enterprise IT

All rights reserved © 2005, Alcatel Page Conditions for user acceptance  Create comfort:  > reasonable policy (enforcable)  > always offer practical solutions to cope with policy (e.g. tokens and identity cards instead of strict rules on passwords, provide list of devices which are allowed and supported by IT, transparancy for data encryption and mail encryption,...)  > provide device administration as service (virus scanner, content management,...)  The user needs to be in a position to manage his keys in a responsible way.

All rights reserved © 2005, Alcatel Page Once user acceptance is achieved Mobile Devices Networks Encryption becomes the rule! data encryption on device access control on device PKI managable user acceptance

All rights reserved © 2005, Alcatel Page  All future communication will be encrypted:  > Access control and encryption has moved directly on mobile devices.  > The next step is the general use of encrypted communication.  Protection of data is key for any economy depending on innovation:  > All future data will be either published or encrypted.  > Serves both enterprises and governments.  Who cares for private users and small enterprises?  > Possibly application service providers or mobile network providers. Outlook

All rights reserved © 2005, Alcatel Page Thanks for your attention! Questions?