Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
SECURITY ISSUES IN NETWORKS WITH INTERNET ACCESS PRESENTED BY Sri Vallabh Aida Janciragic Sashidhar Reddy.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Securing the Borderless Network March 21, 2000 Ted Barlow.
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Chapter 19 Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Business Intelligence: Data and Text Management Instructor: Bajuna Salehe Web:
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Storage Security and Management: Security Framework
Defining Security Issues
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
C8- Securing Information Systems
SEC835 Practical aspects of security implementation Part 1.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
ACM 511 Introduction to Computer Networks. Computer Networks.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
DIGITAL SIGNATURE.
Network Security & Accounting
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Computer Security and Cryptography Partha Dasgupta, Arizona State University.
Computer Security By Duncan Hall.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Security Outline Encryption Algorithms Authentication Protocols
Grid Security.
Chapter 17 Risks, Security and Disaster Recovery
Message Digest Cryptographic checksum One-way function Relevance
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
ONLINE SECURE DATA SERVICE
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks

Presentation Goal How To Protect a Corporation’s Sensitive Assets throughout the Web Server and Storage Infrastructure with a Centralized, Network-Attached Architecture

Speaker’s Background  Ingrian Networks is an application security company specializing in protecting the privacy and integrity of your data, whether it is in your database, being transported via JMS, etc, etc  Sanjay Beri holds several patents in the area of Internet security, has led the design and development of software, firmware and hardware at various small to large companies, and is a co-founder of Ingrian Networks and responsible for their product management and strategy

Presentation Agenda or Key Topic Areas  What is The Data Privacy Problem?  How Do You Solve The Problem?  Which Solution Architecture Do You Need?  Examples of Using Ingrian NAE  Summary

The Unprotected Zone I Client Web Server Database Storage Sys NAS The Internet Network Switch Application Server AA SSL Firewall App Firewall IDS Unprotected transaction zone! Sensitive data in the “backend” is very vulnerable to internal and external attacks.

Unprotected Zone Threats  Theft  Modification  Defacement  Unauthorized viewing  Fraudulent distribution  In general, any other unauthorized or unsanctioned activity “For-money” hackers internal threats competitors “For-fun” hackers

Area A: Inter-Application Server s Web Servers Database Storage Sys NAS Application Servers Unprotected transaction zone! JMS, SOAP, RMI, IIOP, RMI over IIOP, JRMP, or something else? Regardless of the protocol, the DATA being transported must be protected against the many threats, and this must be done in a manageable fashion.

Area B: Application Server to Storage Web Servers Database Storage Sys NAS Application Servers Unprotected transaction zone! JDBC, ODBC, OLE-DB, or something else? Regardless of the protocol, the DATA being transported must be protected against the many threats.

Area C: Data while in Storage Web Servers Database Storage Sys NAS Application Servers Unprotected transaction zone! Oracle9i, DB2, some other database? Server, mainframe, or something else? NAS, SAN, etc? Regardless of where the DATA is stored and how it is stored, the DATA must be must be protected against the many threats.

Vulnerability Summary Area of Vulnerability A.Transport B.Transport C.Persistent Storage Web Servers Database Storage Sys NAS Application Servers Unprotected transaction zone! A. B. C.

Remedy for A Web Servers Database Storage Sys NAS Application Servers Unprotected transaction zone! A. Sender: Encrypt and Add Integrity Check Receiver: Verify Integrity and Decrypt

Remedy for B and C Web Servers Database Storage Sys NAS Application Servers Unprotected transaction zone! B. Sender: Encrypt and Integrity Check or Fingerprint via Keyed Hash or Sign Receiver: Verify Integrity and Decrypt or Fingerprint Data Again and Compare or Verify Signature C.

Key Considerations for a Solution Security Management and Administration Scalability Ease of Integration and Deployment

The Possible Solutions? Solution 1 (only for C): Do it on the Storage System (eg. the database)? Solution 2: Do it Per Web/Application Server? Solution 3: Network-Attached Cryptographic Services? Web Servers Network Switch Application Servers Firewall Solution 1 (only for C) Solution 3 Solution 2 Database Storage Sys NAS

Security Comparison Network- Attached Per Server Database (C Only) Private and secret keys stored and managed on a secure system -- Adherence to FIPS standards for key management and cryptography -- Secure logging and reporting of all cryptographic operations -- Secure auditing of all system management operations - Fine-grained user ACLs and multi-factor authentication for administration and management of system Maybe Access control to allow only authorized applications to perform cryptographic operations --

Management & Administration Network- Attached Per Server Database (C Only) Manage your keys in one secure location -- Manage all aspects of the system via a secure interface - Access and store all your logs, statistics, and cryptographic services information in one secure central place -- Ensure your applications are synchronized by ensuring they all use the same keys, enforce the same access policies, etc --

Scalability & Cost Network- Attached Per Server Database (C Only) Do not burden existing web/application servers - Do not burden the storage system (i.e. database) - Scale to higher performance easily -- Consolidate cryptographic services to reduce administration costs --

The Best Solution  The Network-Attached solution is the best solution from all angles: – Can remedy all 3 (A, B and C) vulnerabilities – Does it securely – Makes it easy to manage, monitor and administer – Does not burden existing infrastructure and scales easily

Network-Attached Encryption (NAE) Web Servers Application Servers Ingrian Network-Attached Encryption Solution Database Storage Sys NAS  Works with any web or application server  Works with any type of content (credit cards, passwords, patient records, entire files, images, spreadsheets, etc)  Works no matter where you store the data (e.g., databases, servers, SANs, NAS, etc.)

Summary  Protecting data at the field level in storage is vital  Secure, easily manageable, centralized and consolidated key management and cryptography is vital  Network-Attached Cryptography and Key Management is the solution  This is what Ingrian Networks provides (