Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
9 - 1 Computer-Based Information Systems Control.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 1 – Introduction
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
FIT3105 Smart card based authentication and identity management Lecture 4.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Security Awareness: Applying Practical Security in Your World
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Week #7 Objectives: Secure Windows 7 Desktop
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Moscow, 2009 ACCORD-TSHM Accord. Reliability in an unreliable world. OKB SAPR Special Design Bureau for CAD System Design
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Москва, 2011 OKB SAPR Если Вам есть что скрывать.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Chapter 2 Securing Network Server and User Workstations.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Wireless and Mobile Security
Managing Applications, Services, Folders, and Libraries Lesson 4.
Web Services Security Patterns Alex Mackman CM Group Ltd
Understand Encryption LESSON 2.5_A Security Fundamentals.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Moscow, 2009 ACCORD-THSM Accord. Reliability in an unreliable world. OKB SAPR Special Design Bureau for CAD System Design
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
CPT 123 Internet Skills Class Notes Internet Security Session B.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Chapter 1 Getting Started
Outline What does the OS protect? Authentication for operating systems
UNIT 19 Data Security 2.
Outline What does the OS protect? Authentication for operating systems
Digital Signature.
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Presentation transcript:

Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment and Informatization

A personal computer is only an instrument.

Are you sure that YOUR PC is only YOUR instrument?

Are you sure about it EACH TIME that you turn it on?

You need the assurance no PC hardware has been changed; no PC software has been changed; no data, stored on your PC, has been changed or became known to an intruder. that while you were away

In order to provide security, it is necessary to understand what exactly is the OBJECT OF PROTECTION. and not simply protect,

The objects of information protection the computer equipment (CE); the data that is stored and processed by the CE; data processing technologies; data transmission channels. are defined by the things that the intruder’s activities may be aimed at:

The goals of the information protection protecting your computer from the unauthorized access; delimitating the data access rights; providing the invariability of the data processing technology; transferring data in a protected form. are defined in accordance with the objects:

The goals of the information protection Accord-TSHM and the information protection systems, which are based on it. are solved by using the unauthorized access control product

The first task of information protection is protecting your PC from an unauthorized access (UA).

An UA protection tool must: allow working on this PC only for those users who have a right to work on this PC, according to the security policy; control the state of the computer hardware and software for the absence of any unauthorized modifications.

What should an UA protection tool be like? Checking the integrity of the software environment with the help of some program — can we be sure in its own integrity? First, we need to check that program. And before that — check the program that is going to check it…

W hat should an UA protection tool be like? Can you pull yourself out of a swamp? You can. If you have a support point, which is outside of the swamp.

W hat should an UA protection tool be like? independent from the PC operating and file system inaccessible for the introduction of modifications hardware-based.

At the end of last century, we have developed a concept of hardware protection and an Data Security Tool (DST), which became and still remains a standard for all of the developers.

Provides a secure boot of the operating system, irrespective of its type, for an authenticated user. Accord- TSHM : Trusted Startup Hardware Module

What is secure boot? the user identification/authentication. integrity checking of the PC hardware and the software utilities, using a step-by-step integrity inspection algorithm; blocking the operating system boot from the external storage mediums; The operating system boot is performed only after a successful completion of the following procedures:

Accord- TSHM : has been patented has 28 conformance certificates and has more than implementations in the governmental authorities and commercial organizations, as of the end of the year 2008.

SHIPKA PERSONAL cryptographic data security tool (PCDST)

Ideal information interoperability:  Mobile  User-friendly and  Protected

Real life confronts you with an alternative:  Mobile  User-friendly OR  Protected

Real life confronts you with an alternative: Using confidential information  Mobile  User-friendly OR  Protected

Real life confronts you with an alternative: Storing the passwords for the web-services and the encryption keys/ Electronic Digital Signature (EDS)  Mobile  User-friendly OR  Protected

Real life confronts you with an alternative: Banking account administration  Mobile  User-friendly OR  Protected

Of two evils choose the lesser!

Of two evils choose the lesser!

In order to have everything you need, it’s enough to have PCDST SHIPKA with you.

PCDST SHIPKA Mobility: doesn’t require software installation from additional carriers; may be used at any PC, which has an USB-plug. User-friendliness: doesn’t require cryptographic libraries installation on PC; provides safe storage and application of the personal confidential data; doesn’t require any special skills when operating on PC or in the Internet. Protectability: hardware implementation of the cryptographic algorithms, protected random number generator, protected permanent memory, applying the keys without transferring them to PC.

Main solutions, using SHIPKA for the encryption and/or signing of the files; We offer to use PCDST SHIPKA:

Main solutions, using SHIPKA for the automatic filling of the WEB- forms of various WEB-services and for storing passwords and other data, required for that; We offer to use PCDST SHIPKA:

Main solutions, using SHIPKA for the hardware identification and authentication on PCs and notebooks when booting OS Windows, as well as in the terminal solutions; We offer to use PCDST SHIPKA:

Main solutions, using SHIPKA as a keys storage and a hardware- based random number monitor for the cryptographic applications; We offer to use PCDST SHIPKA:

Main solutions, using SHIPKA as a “smart-card” in the template solutions, for example, the authorization when entering the Windows domain, encryption and/or signing of the messages in the mail programs (Outlook Express and so on), for obtaining the Verification Center certificates; We offer to use PCDST SHIPKA:

Main solutions, using SHIPKA for the informational technologies protection with the help of the Authentication Protection Code. We offer to use PCDST SHIPKA:

PCCARD ExpressCard Compact Flash Today PCDST SHIPKA is not only USB-device But also

Carry everything you need with you!

Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment and Informatization Please, ask your questions!