Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting the Enterprise while lowering the bottom line.

Similar presentations


Presentation on theme: "Protecting the Enterprise while lowering the bottom line."— Presentation transcript:

1 Protecting the Enterprise while lowering the bottom line.
Cyber Security Protecting the Enterprise while lowering the bottom line. June 3, 2004 Kevin Dziekonski

2 Cyber Security What does Cyber Security encompass?
Secure Information Transfer E-commerce Enterprise LAN/WAN Web Presence

3 How is this accomplished?
Proprietary based systems Application layer switches Software Linux based systems (Open Source) Linux flavors SELinux

4 What is SELinux? As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's Information Assurance Research Group have been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. As a consequence, application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security.

5

6 Cost of being secure Proprietary Linux Very Expensive
Recurring maintenance costs (~20-40% of Initial purchase price Product Lifecycle Specially trained personnel Linux Shared cost Indirect Direct 68% of the Internet is Linux based

7 Total Cost of Ownership
Purchase Price Maintenance Cost (25%) Lifecycle (Years) Total Router $ ,000.00 $ ,250.00 3 $ 37,500.00 IP Traffic Scanner $ ,000.00 $ ,000.00 $ 60,000.00 IP Load Balancer Firewall $ ,000.00 $ ,750.00 $ 22,500.00 Server Load Balancer Intrusion Detection System (IDS) Servers $ ,000.00 $ 10,000.00 $ 235,000.00 Redundancy Total $ 470,000.00

8 Linux Deployed?

9

10 Support model Become SELinux support specialists Test Bed IV&V
Release updates Virus DDoS DNS Blacklists

11

12 Is it working?


Download ppt "Protecting the Enterprise while lowering the bottom line."

Similar presentations


Ads by Google