Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
MX25: Multifunction SIP Gateway Zultys Technologies.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Virtual Private Networks and IPSec
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Remote Desktop Connection Techniques Wireless Communication Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
Dynamic Routing Inside IPsec VPNs
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Providing Teleworker Services
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Networks Manraj Sekhon. What is a VPN?
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Network Access for Remote Users Dr John S. Graham ULCC
Dynamic Routing Inside IPsec VPNs
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
IPSec Detailed Description and VPN
Chapter 1 Introduction to Networking
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Visit for more Learning Resources
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
Security Protocols in the Internet
Providing Teleworker Services
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
Providing Teleworker Services
Topic 12: Virtual Private Networks
Providing Teleworker Services
Presentation transcript:

Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine

Characteristics of the information Confidentiality only authorized persons may become familiar with the information Integrity only authorized persons may in any way modify the information Accessibility any authorized object may obtain data within the certain (short) time interval

Teleworkers Remote SitesCentral Sites ATM / FR / ISDN WAN Router Network Reference Model PBX Hub IPT Gateway Hub PSTN Router WAN Violator (internal) L3 Switch L2 Switch PBX Violator (External) Internet WAN Router/ IPT Gateway

Confidentiality The violation of confidentiality (privacy): disclosure of information Typical ways for disclosure of information: –“sniffing”: listening of the data transmitted via a telecommunication channel –“spoofing”: an authorized object of telecommunication exchange is substituted by an unauthorized object

Teleworkers Spoofing Sniffing WAN Router Violation of confidentiality Hub WAN L3 Switch L2 Switch Internet WAN Router/ IPT Gateway Router

Integrity The violation of integrity: –partial or complete loss of the information –falsification of data Hub WAN Router/ IPT Gateway Router

Accessibility The violation of accessibility: denial of service (DoS) attacks Hub WAN Router/ IPT Gateway Router

Methods of information protection Authentication of objects Data ciphering (encryption) Signing of data Redundancy and backup in storage of data Redundant data channels

Virtual Private Networks Public Internet (Untrusted network) Private Public Private Public FR or Leased Line (Intranet, trusted private network) Public WAN VPN (Dynamic routing over encrypted tunnels) Public WAN (Clear-text, static routing) Private WAN (Clear-text or Encrypted Routing - Static, RIP, OSPF) Branch Office Tunnel IP Phones Video conference

Transport and Tunnel Mode New IP Header Sec Protocol Header Data IP Header Data Tunnel Mode Original IP Header Sec Protocol Header Transport Mode Original IP Header Data Encryption Outer IP Header Inner IP Header

A good example: Nortel Networks Contivity Modular Service Options Decreased Cost Software License Keys Firewall Services VPN Services Adv Routing Base Services Contivity can function as –VPN device –Router –Firewall –Or any combination