Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Rambling on the Private Data Security
1 Minimal TCB Code Execution Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Arvind Seshadri Carnegie Mellon University May 22, 2007.
Module 3 Windows Server 2008 Branch Office Scenario.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
SEC316: BitLocker™ Drive Encryption
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Controls for Information Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Mobility for the Enterprise
Payment Card Industry (PCI) Data Security Standard
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
New Data Regulation Law 201 CMR TJX Video.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
November 2009 Network Disaster Recovery October 2014.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Clinic Security and Policy Enforcement in Windows Server 2008.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Windows Server 2008 Chapter 10 Last Update
Intrusion Detection MIS ALTER 0A234 Lecture 11.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Internet Security for Small & Medium Business Week 6
Week #7 Objectives: Secure Windows 7 Desktop
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 6 Planning and Deploying Messaging Security.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Deepnet Unified Authentication for Outlook Anywhere.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
MARK B. JONES PKI DEPLOYMENT FORUM MADISON, WI APRIL 16 TH, 2008 Why do I need a Digital ID?
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Mike Memory.
Understand Encryption LESSON 2.5_A Security Fundamentals.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
CompTIA Security+ Certification Exam SY
Documents. Process. Data. Payables
CompTIA Security+ Chapter 5 Test Review
Configuring Encryption and Advanced Auditing
Working at a Small-to-Medium Business or ISP – Chapter 8
Hardware security: The use of a Trusted Platform Module
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
12 STEPS TO A GDPR AWARE NETWORK
Implementing Client Security on Windows 2000 and Windows XP Level 150
PLANNING A SECURE BASELINE INSTALLATION
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006

Overview of Trusted Platform Module (TPM) Hardware Chipset or Microcontroller Stores keys, passwords, or certificates Information stored on chip not hard drive Improves data security Secure Applications Utilize TPM hardware Authentication Encryption

New Dell Laptops shipping TPM Capable Latitude D820 Hardware Disabled Software Enabled, Possible Vulnerabilities Latitude D610 Hardware Disabled Software Not installed

Current Security Posture Only Latitude D820s Deployed Clean Laptop Installs Defense-in-Depth Network Firewall Egress/Ingress Rules Checkpoint Integrity Personal Firewalls VPN Configuration / Firewalls IDS

Recommendations Tactical: New IDS Rules Destination TCP/UDP port TCP/UDP DNS Queries for wave.com Strategic: Evaluation of New Technologies Hard Drive Encryption Encryption Authentication

TPM: Future Possibilities Hard drive Encryption RSA Acceleration Boot Process Integrity Any Application can Access TPM Hardware Encryption Secure Deletion Document Management Authentication Multifactor Biometrics

Conclusion Our current network posture mitigates risks from the new Dell D820 TPM implementation Addition of new IDS rule will monitor to ensure our policies are effective Disk and encryption technologies must be evaluated TMP technology offers possible future security enhancements Continued Vigilance Required when dealing with new technologies!