U.S. Department of Energy Pacific Northwest National Laboratory July 2004 Presented by Jeffery Mauth Pacific Northwest National Laboratory

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Cisco Unified Wireless Network Webinar Commercial WLAN.
Chapter 12 Network Security.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
A Guide to major network components
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
PRESENTATION ON WI-FI TECHNOLOGY
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Network security Product Group 2 McAfee Network Security Platform.
Network Components By: Zach Przybilla CECS 5460 Fall 2015.
The Real Time Initiative Laying the foundation for a Real Time Enterprise Internet Telephony Conference & EXPO October 14, 2003.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Mike Memory.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
KFUPM Wireless LAN Sadiq M. Sait. Contents  Introduction  Technology - Brief overview  Project Plan RFP and Start dates Progress Curve  Coverage and.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
IS3220 Information Technology Infrastructure Security
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
ORNL is managed by UT-Battelle for the US Department of Energy Cyber Security Assessment of the SNS ICS Karen S. White 10/18/15.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
PNNL Site Update July, 2009 Lewis Allen, Network Engineer.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Chapter 7. Identifying Assets and Activities to Be Protected
James Tucker Dr. Durrett ISQS 6342
Chapter 4: Wireless LANs
THE NEXT STEP IN RESILIENT, HIGH-CAPACITY NETWORK CONNECTIVITY
IS4550 Security Policies and Implementation
Cloud Security for Endpoints
Presentation transcript:

U.S. Department of Energy Pacific Northwest National Laboratory July 2004 Presented by Jeffery Mauth Pacific Northwest National Laboratory 2-Factor Authentication & WiFi Security at PNNL Presentation Outline: 2-Factor Authentication at PNNL Drivers Enclave Design Multiple Sites WiFi Security at PNNL Threats and Risk Mitigation 2nd Generation Architecture (Wireless Enclaves) Rogue Detection and Wireless IDS Future Directions ESCC Meeting, July 21-22, 2004

U.S. Department of Energy Pacific Northwest National Laboratory July Factor Authentication at PNNL Drivers Enclave Design Multiple Sites

U.S. Department of Energy Pacific Northwest National Laboratory 3 2-Factor Authentication -- Drivers Usernames and Passwords n DOE passwords have a lifetime of no more than 6 months n Keystroke capture tools are being used more and more by the bad guy’s n 6 months is a lifetime for a bad guy to do bad things n Difficult to detect since username/password is real n Shared resources across DOE exacerbate the problem n 2-Factor one time passwords solve this problem … almost Automated functions requiring authentication are more difficult Replay attacks *MAY* be possible in some circumstances Multi-site access with a single token challenging n The PNNL enclave design required 2-Factor OTP

U.S. Department of Energy Pacific Northwest National Laboratory 4 2-Factor Authentication -- Enclave Design Multi-Program Labs require Multiple Security Policies n PNNL is an Office of Science Laboratory with a significant National Security mission Office of Science programs generally have many visitors both on-site and remote from around the world, security policy must accommodate National Security programs generally require security policies that are much more restrictive Business and financial systems also require protection but all PNNL staff need access to these systems Wireless networks have unique issues n PNNL evaluated different strategies to solve these problems and determined that an enclave solution was best for PNNL

U.S. Department of Energy Pacific Northwest National Laboratory 5 2-Factor Authentication -- Enclave Design Multi-Program Labs require Multiple Security Policies n Enclave Solution implemented at PNNL 2-Factor OTP a critical part of the enclave design Multiple enclaves with different security policies Programmatic requirements determine which enclave Each enclave isolated from others by firewall n Results we have seen at PNNL Prior to implementation, gnashing of teeth, wails, the world is ending as we know it … After implementation most staff not seriously impacted, the gnashing has stopped, we are still here, there are still some quiet wails though Benefit: Lower risk associated with external access into the lab and improved access control to meet programmatic needs Still a work in progress

U.S. Department of Energy Pacific Northwest National Laboratory 6 2-Factor Authentication -- Multiple Sites How to work with Others n 2-Factor OTP solutions for a single site are relatively straight forward Single management policy and funding stream Risk management and acceptance by site n Integration between sites becomes more challenging Multiple management policies and funding streams Risk management and acceptance more difficult –Who trusts who, and how much to trust them? –Changes in risk profile at a single site affects other sites n Questions on implementation One token or many How willing will the user base be Will it harm scientific productivity

U.S. Department of Energy Pacific Northwest National Laboratory 7

U.S. Department of Energy Pacific Northwest National Laboratory July 2004 WiFi Security at PNNL Threats and Risk Mitigation 2nd Generation Architecture (Wireless Enclaves) Rogue Detection and Wireless IDS Future Directions

U.S. Department of Energy Pacific Northwest National Laboratory 9 WiFi Security -- Overall Network Goals and Objectives Scalable, Secure, and Flexible Wireless Access n Goal: Multi-Layered Security Basic, low-cost detection and location of “rogue” devices –Sensor functions built in to standard Cisco AP Advanced Wireless IDS functions –AirDefense, wireline methods Dedicated, specialized sensors, as needed (open source & proprietary) –LAIs, sensitive areas, outdoors –Campuses and buildings in different locations across the US (rural to metro) n Goal: Flexible Network Access Multiple, Adaptable Wireless Networks – Different security policies, authentication methods, and users Reliable, Scalable Coverage –High-density b/g –High-performance a “hotspots”, as needed Integration with wired networks, target key business applications –Staff productivity, extend network resources, and new mobility applications

U.S. Department of Energy Pacific Northwest National Laboratory 10 WiFi Security -- Threats and Risk Mitigation Security Policy Separates Wireless and Wired Networks PNNL Networks (Building Access Control) Wireless Networks (Enclave Access Control) Firewall Campus Internet Building A Threat Building A Wireless Device Primary Rogue Threat Firewall Mitigation  Staff Remote Access / VPN / 2- factor / FW  IDS outbound traffic monitoring  “Wireline” tools  Deploying Wireless IDS campus coverage Primary risk is that an outside attacker will bypass enterprise firewall via rogue. Note: “Airspace DMZ” covers entire campus. Different than wired DMZ. DMZ

U.S. Department of Energy Pacific Northwest National Laboratory 11 WiFi Security -- 2 nd Generation Architecture Wireless Enclaves Add Flexibility and Security

U.S. Department of Energy Pacific Northwest National Laboratory 12 WiFi Security -- Rogue Detection and Wireless IDS Goals and Challenges * Target popular unlicensed protocols, but address new DOE orders as needed n Primary Goals Achieve Acceptable Risk – Mitigate risks “sufficiently” Cover Full Campus (Inside Buildings) –Mitigate primary threat of rogue “open doors” in ~60 buildings with network connections Efficient 24x7 Operations –Cost-effective integration with overall network security systems, procedures and staff n The Challenges (changing…) Wide Area Network (2G, 2.5G, 3G ) – Pagers, cell phones, Blackberries, “smart phones” – Metro Area Network (IEEE ) Local Area Network (IEEE b/g/a or Wi-Fi* – Solid rogue coverage for these popular products and protocols Personal Area Network (IEEE ) – Bluetooth (growing fast); – Zigbee, Ultra Wideband (UWB)

U.S. Department of Energy Pacific Northwest National Laboratory 13 WiFi Security -- Rogue Detection and Wireless IDS Combined Solution is Best for PNNL Environment n Combined AirDefense-Cisco solution provides “sufficient mitigation” with the best functional capability, the most flexibility, at the least cost. See figure below for multi-layered approach to wireless security and IDS. n PNNL has evaluated 5 different products against detailed evaluation criteria (ISS, AirWave, Open Source, AirDefense, and Cisco) Rapidly changing wireless arena (both threats and opportunities) On the Wire In the Air Wireline Tools (Covers Entire Network) Combined Access / Sensor (Buildings w/ Cisco APs) Sensor Only (LAIs, mobile) Basic Rogue Detection/LocationAdvanced Detection

U.S. Department of Energy Pacific Northwest National Laboratory 14 WiFi Security -- Future Directions Rapid Growth in Use of Wireless Products and Services n Wireless rogue detection is essential whether wireless is authorized or not for use in an enterprise. Easy to install wireless that bypass firewalls, either knowingly or not. n Wireless enclaves provide good solution for providing flexible architectures and levels of security. Technology is moving rapidly; more alternatives soon. n Industry direction and investments will drive strong adoption of wireless in the marketplace. Wireless “on ramp” to networks for many devices. How will this affect DOE and other government agencies? –DOE N and other directives

U.S. Department of Energy Pacific Northwest National Laboratory July 2004 Questions? Contact Information Dave Hostetler Wireless LAN Project Manager Jeffery Mauth