Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012.

Slides:



Advertisements
Similar presentations
Security for Mobile Devices
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
1 Federated Identity and Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 15, 2013
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Security and Policy Enforcement Mark Gibson Dave Northey
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Andrew Schroeder Networking Aspects of Cloud Computing.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Public Key Infrastructure Ammar Hasayen ….
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Installing and Troubleshooting Hardware Device and Drivers Chapter 6 powered by dj.
Windows Vista: Volume Activation 2.0
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Information Security for Managers (Master MIS)
CS 4720 Security CS 4720 – Web & Mobile Systems. CS 4720 The Traditional Security Model The Firewall Approach “Keep the good guys in and the bad guys.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
SODA Archiving October 2013
Authentication & Authorization: Security and Integrity in the Cloud Desmond White July 3,
® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bobby Caudill Solution Architect, Global Government August 2008 Adobe Solutions for Government.
·
Module 11: Remote Access Fundamentals
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Document Management Service MaestroTec, Inc. D ocument M anagement S ervice Improve the way you manage your critical business documents.
Ian Bailey Director Application Architecture Office of CIO, Province of BC A User Centric and Claims Based Architecture for British Columbia.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Chapter 4 - X.509 Authentication TE-405 Network Security and Management Fall Dr. Faisal Kakar
Security Vulnerabilities in A Virtual Environment
Understand Encryption LESSON 2.5_A Security Fundamentals.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
INTRODUCTION DATABASE TO. Who Needs a Database?????? We all do!!!!!!!!
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Module 9: Configuring Network Access
Cloud Security– an overview Keke Chen
Security and Encryption
Outline What does the OS protect? Authentication for operating systems
Virtual Private Networks (VPN)
Andy Taylor Partner Program, RPost
Outline What does the OS protect? Authentication for operating systems
Internet Basics.
Office 365 Identity Management
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Office 365 Identity Management
Networking and Security
Only Windows 10 Pro devices
Done by:Thikra abdullah
Presentation transcript:

Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

So what’s the Problem with the Internet Wave Systems Corp © 2012 November 14,

People are really bad solution for security User Names Passwords Don’t Work Well A New Identity Paradigm for NSTIC and You

The Shift Network based on Connections to Network based on Identity

A little history from the cellular industry Cloning Incidents Time Introduction of Device ID in cellular US Analog to Digital conversion A tamper resistant store for ID

Trusted Computing – Hardware Solution – Already Deployed Hardware Based Security – The Best and Brightest – Computers, Software, Silicon – Software has Proven Ineffective Based on Open Industry Standards – Non-proprietary Solution Core to Microsoft Security – Logo compliance – Business Version since Vista – Expanding to Tables and Phones in Win Million Computers – Today – Already Deployed Why don’t I know about it - Stealth

Imagine Only Your Computer Can Log In To Your Accounts Trusted Platform Module (TPM) The Device Is a Powerful and Secure Attribute

Hardening Access – A Hardware Root of Trust You Should Have Only Known Devices On Your Network VPN and Wireless Access to Your Network Is a Vulnerability NSA demonstrated several years ago, using software purchased on the internet, it is very easy to steal the key for VPN or Wireless access and now recommends they be hardened by storage in hardware like the TPM

Attribute Providers Deliver the Identity Proof Device Identity & Machine Health Personal Identity

Trust in an NTSIC World Attribute ProvidersRelying Parties Attribute Provider Network

Another Twist to Consider 11 Hello  Hello All data is encrypted in transit

Corporate Use Case … When You Sign the NDA Wave Systems Corp © 2012 November 14, Encrypted Alpha CorpOmega Corp

Putting It All Together Delivers Value and Most all Trust Authentication of a Trusted & Healthy Device – A proven paradigm Authentication of a Users – Password to Log into Device – only once Electronic Signature – Saving money and time Encrypted Data and Text – Safe in transmission, safe when stored in the cloud – Unlocked only by authorized user(s) or groups of users – Log of who unlocked the file or text and when NSTIC is the Catalyst Moving the Industry to Higher Security and Usability NSTIC

14 ESIGNSYSTEMS – 13 years of passionate delivery of electronic signature and delivery systems The Most Mortgage Transactions in the Industry In-House and Hosted Solutions Professional Services for ESIGN and UETA Compliance Andrew W. Tarbox Office: Falls Church, VA Come See Us for Solutions Kelly Purcell Office: (602) Paradise Valley, AZ