Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Official information in email – managing the risk of leakage ● Reduce risk via protective markings ● Simplify.

Slides:



Advertisements
Similar presentations
Unified. Simplified. Unified Communications Launch 2007.
Advertisements

Securing Corporate & Documents Richard Elphick Titus Labs.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
SMTP – Simple Mail Transfer Protocol
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Internet…issues Managing the Internet
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
T.Sharon-A.Frank 1 Multimedia Various Applications.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Fact check True or False: Over half of the messages received today in Exchange Online are spam True. About 67 % of all messages are spam True or False:
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Configuring Hybrid Exchange the Easy Way
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
03/09/05Oregon State University X-Sig: An Signing Extension for the Simple Mail Transport Protocol (SMTP) Robert Rose 03/09/05.
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Application Protocols: ELECTRONIC MAIL (SMTP, POP) CSNB534 Semester 2, 2007/2008 Asma Shakil.
Securing Microsoft® Exchange Server 2010
1999 Asian Women's Network Training Workshop 1 Technical Terms We Can’t Avoid.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Demos Sharing a document B2B Protected with Policy Tips Departmental Templates Mac Outlook Protected PDF OneDrive / SharePoint Document Tracking.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
NHIN-Direct SMTP/ Notes 6/8/2010. Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood.
Examples – RFC 5322 MIME messages multipart/alternative Human Readable Text To: "External, User" From: "Test, User1" Subject: I-D ACTION:draft-ietf-mailext-pipeline-01.txt.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
File Transfer Protocol (FTP)
1 Electronic mail security Ola Flygt Växjö University, Sweden
1 Chinese . 2 Introduction  Support SMTP/POP3/IMAP4  On Unix platform  Provide Webmail –Functions: On line registration On line sending and receiving.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Chapter 16: Distributed Applications Business Data Communications, 4e.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Web Programming Week 9 Old Dominion University Department of Computer Science CS 418/518 Fall 2010 Martin Klein 10/26/10.
ViciDocs Safe Creating Info repositories from documents.
Web Services. 2 Internet Collection of physically interconnected computers. Messages decomposed into packets. Packets transmitted from source to destination.
Unified. Simplified. Unified Communications Launch 2007.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
Technical Awareness on Analysis of Headers.
Chapter 16: Distributed Applications Business Data Communications, 4e.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
COMP 431 Internet Services & Protocols
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Spam liquidator What is SL ??? Definition : It is a tool to block the junk mail !
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Virtual Private Network Access for Remote Networks
Virtual Private Networks
Threat Management Gateway
Meganet Corporation VME Mail 2004
Social Media And Global Computing Sending
Virtual Private Network
Chapter 2 Application Layer
Microsoft Data Insights Summit
Presentation transcript:

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Official information in – managing the risk of leakage ● Reduce risk via protective markings ● Simplify security for end-users ● Whole of Government approach Neville Jones November 2005

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Concept ● PSM rules for ● Keep ICT Security Simple for users ● make system do the hard stuff ● get more value out of system

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED In the beginning there was...

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Official ● as channel – big – useful ● Risks for Government

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED security difficult for users ● Message path hell ● policy hell ● Users are not routing experts! ● Users are not security experts!

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Message path hell ISP Private Individual (Remote) Officer Wireless (Wireless) Officer firewall Your Agency Officer Private network Partner Agency Officer Internet Partner Agency Corporate Network Officer Fax gateway PSTN

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED security can be simpler ● Let system do the work! ● Enforce policy at components ● Use principles of PSM ● How to put protective markings in s?

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Protective markings for RFC2822 MESSAGE RFC2822 BODY RFC2822 HEADER MIME BODY(s) MIME ATTACHMENT(s) Message-ID: Date: Wed, 230 Nov :28: From: "Jane Doe" User-Agent: Microsoft Outlook X-Accept-Language: en-us, en X-Protective-Marking: [VER=2005.6, NS=gov.au, SEC=UNCLASSIFIED, MIME-Version: 1.0 To: "Smith, John" Subject: Hello World [SEC=UNCLASSIFIED] Content-Type: text/plain; charset=ISO ; format=flowed Content-Transfer-Encoding: 7bit

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Creating the marking

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Real world problem

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Risk management implementation ● client enablement ● Encryption invoked by classification level ● End user doesn't have to click “Encrypt”

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Wide scope of application ● Client side rules ● Gateway flow control ● Gateway encryption/decryption ● Official register ● Archive management ● Web headers

Copyright © 2005 janusNET Pty Ltd UNCLASSIFIED Gateway flow control ● Major area of Government activity ● DSD / ACSI33 & AGIMO ● Sending ● Receiving ● Agency adoption