IEEE P2600 Working Group CygnaCom Solutions Introduction Kris Rogers 25 April 2007.

Slides:



Advertisements
Similar presentations
Computer Technology Timpview High School. A collection of local, regional, national, and international computer networks that are linked together to exchange.
Advertisements

SMALL BUSINESS SHOWCASE COACT, Inc. is a Service Disabled Veteran Owned Small Business (SDVOSB). Niche Areas: Certification & Accreditation (C&A) FIPS140.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
October 3, Partnerships for VoIP Security VoIP Protection Profiles David Smith Co-Chair, DoD VoIP Information Assurance Working Group NSA Information.
Information Security and Assurance Center 1 Address: 615 McCallie Avenue Phone: Chattanooga TN 37403
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Understanding Active Directory
Electronic Digital Computer Mechanic Apprentice Program Cultivating technical skills critical to current & future needs Preparing our workforce to support.
1 DoD Public Key-Enabling (PK-E) of Applications 1st Annual PKI Research Workshop NIST 4/25/02.
Communications and Networks
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
PROTECTION OF NATO INFORMATION AND NATO CIS Col
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
Course 201 – Administration, Content Inspection and SSL VPN
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Alabama Supercomputer Authority A partnership of … and.
A Security Business Case for the Common Criteria Marty Ferris Ferris & Associates, Inc
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
U.S. Common Criteria Evaluation & Validation Scheme (CCEVS) Update 25 September 2007 Audrey M. Dale Director, NIAP CCEVS.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
An Analysis of 3G Phone Security Emily Maples & Evan Nakano CMPE 209.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations.
NIST and Computer Security Competencies and Resources to Support E-Voting and Security Ed Roback Chief, Computer Security Division Information Technology.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Wednesday, September 9 th Dr. Dennis S. Kubasko, Jr. EDN 303 Unit 2 – Class 1 Online.
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
Implementing Microsoft Exchange Online with Microsoft Office 365
CERN Campus Network Infrastructure Specificities Jean-Michel Jouanigot Campus Network Leader CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH EUROPEAN LABORATORY.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
IT Jobs Positions available in the field of Information Technology.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Comparison between Cisco ISR G2 Routers
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
See: under Projects and Planning
CONNECTING TO THE INTERNET
High Performance Computing Lab.
Partnerships for VoIP Security VoIP Protection Profiles
High Performance Computing
Introduction to Computers
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
ISMS Information Security Management System
NAAS 2.0 Features and Enhancements
Firewalls Routers, Switches, Hubs VPNs
Experience. Commitment. Results.
Level 2 Diploma Unit 11 IT Security
Networks 1 Key Revision Points.
Presented by: Faisal Mohamed & Mohamed Dabour
Online Learning.
Instructor: Mort Anvari
Yesterday’s entertainment
Presentation transcript:

IEEE P2600 Working Group CygnaCom Solutions Introduction Kris Rogers 25 April 2007

2 Topics  CygnaCom Introduction  Protection Profile Experience  Product Evaluation Experience  Useful Links  Contact Information

3 CygnaCom Solutions  Founded in 1994  Located in McLean, VA  Business Areas –PKI Consulting and software development –Cryptographic Module Testing Lab (FIPS 140) –Common Criteria Testing Lab (NIAP) –General security consulting  Acquired by Entrust in 2000

4 CygnaCom Security Evaluation Lab  CygnaCom was first US lab established under TTAP in 1997  CygnaCom was first batch of CCTLs accredited under NIAP/CCEVS scheme in 2000  Medium-sized lab  15 CygnaCom Employees in CCTL  Experienced IT Security professionals (range: 2 to 37 years of experience)  Most have graduate degrees (1 PhD, 9 MS, 5 BS)

5 CygnaCom PP Experience (1)  USMC Public Key Enabled Application Family of Protection Profiles –Author and evaluator –US example of family of Protection Profiles with packages  Trusted Computing Group Trusted Product Module (TPM) and Trusted Building Block (TBB) –Evaluator only –Worked with Trusted Computing Group, formerly TCPA

6 CygnaCom PP Experience (2)  PKI Directory Protection Profile –Author only  Peripheral Sharing Switch for Human Interface Devices Protection Profile –Author and evaluator –Completed in 2000  Authored several draft Protection Profiles under TTAP scheme

7 Product Evaluation Experience  Completed 35 product evaluations  Second highest number of entries on the NIAP Validated Products List  Wide variety of technologies as shown on the next page

8 Product Evaluation Experience (2)  Technology Types –Cryptographic Chips –Disk Encryptors –Document Servers –Firewalls –Guards –Intrusion Detection / Prevention –Network Management – Operating Systems – PKI – Security Management – Sensitive Data Protection – System Access Control – Web Server – Wireless LAN

9 Useful Links  NIAP / CCEVS Home Page –  NIAP Validated Protection Profiles –  NIAP Validated Products List –  Common Criteria Portal (International Site) –  CygnaCom Evaluated Products List (EPL) –

10 CygnaCom CCTL Contact Information Ms. Nithya Rachamadugu Director Security Evaluation Laboratory (SEL) CygnaCom Solutions 7925 Jones Branch Drive, Suite 5200 McLean, VA (Nithya) (CCTL Lab phone)

11 Kris Rogers Contact Information Ms. Kris Rogers Chief Evaluator Security Evaluation Laboratory (SEL) CygnaCom Solutions 749 Santa Rosita Solana Beach, CA (858)