castle presentation 08-12-04

36
Protect the castle from the inside Protect the castle from the inside Created by William Tabor and Howard Hellman Created by William Tabor and Howard Hellman

Upload: howard-hellman

Post on 22-Jan-2018

247 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Castle Presentation 08-12-04

Protect the castle from the insideProtect the castle from the insideCreated by William Tabor and Howard HellmanCreated by William Tabor and Howard Hellman

Page 2: Castle Presentation 08-12-04

CASTLE TECHNOLOGYCASTLE TECHNOLOGY

• Walls (Firewalls)Walls (Firewalls)

• Draw Bridge (Tunnels)Draw Bridge (Tunnels)

• Moats (DMZs)Moats (DMZs)

HISTORYHISTORY

Page 3: Castle Presentation 08-12-04

HISTORYHISTORY

The battle for TroyThe battle for Troy

proved thatproved that

this this does notdoes not work work

Page 4: Castle Presentation 08-12-04

HISTORYHISTORY

80% of all theft80% of all theft

occurs from theoccurs from the

insideinside

Page 5: Castle Presentation 08-12-04

INTERNALINTERNAL COMMUNICATIONCOMMUNICATION

Is data clear text?Is data clear text?

Page 6: Castle Presentation 08-12-04

INTERNAL COMMUNICATIONINTERNAL COMMUNICATION

PROBLEMS WITH CLEAR TEXT COMMUNICATIONPROBLEMS WITH CLEAR TEXT COMMUNICATION

• Instant messagingInstant messaging

• EmailEmail

• Accounting informationAccounting information

Page 7: Castle Presentation 08-12-04

INTERNAL COMM – INSTANT MESSAGINGINTERNAL COMM – INSTANT MESSAGING

EXAMPLE #1EXAMPLE #1

The CEO and personnel director of a medium-sized company were messaging each The CEO and personnel director of a medium-sized company were messaging each other about potential layoffs.other about potential layoffs.

This information exchange was detected by individuals within the IT department, This information exchange was detected by individuals within the IT department, and news of the discussion spread through the enterprise unchecked, well before and news of the discussion spread through the enterprise unchecked, well before any decisions could be made.any decisions could be made.

Page 8: Castle Presentation 08-12-04

INTERNAL COMM – INSTANT MESSAGINGINTERNAL COMM – INSTANT MESSAGING

EXAMPLE #2EXAMPLE #2

Two writers for a well-known daytime drama were messaging each other regarding a Two writers for a well-known daytime drama were messaging each other regarding a significant plot change.significant plot change.

A tabloid reporter intercepted their conversation and printed his scoop.A tabloid reporter intercepted their conversation and printed his scoop.

The show subsequently dropped 15 ratings points. Each point translates into The show subsequently dropped 15 ratings points. Each point translates into advertising revenue of between $10 and $15 million. advertising revenue of between $10 and $15 million.

Page 9: Castle Presentation 08-12-04

INTERNAL COMM – EMAILINTERNAL COMM – EMAIL

EXAMPLE #3EXAMPLE #3

A car manufacturer spent $240 million on researching and developing an innovative, A car manufacturer spent $240 million on researching and developing an innovative, advanced engine design.advanced engine design.

The company emailed the design to production plant, but the email was intercepted The company emailed the design to production plant, but the email was intercepted by a competing manufacturer. by a competing manufacturer.

The competitor promptly put the new engine design into production, beating the The competitor promptly put the new engine design into production, beating the developer to market – without having to pay a single euro into R&D!developer to market – without having to pay a single euro into R&D!

Page 10: Castle Presentation 08-12-04

PROVIDER OF SECURE SYSTEM SOLUTIONSPROVIDER OF SECURE SYSTEM SOLUTIONS

• Virtual Security ApplianceVirtual Security Appliance

• FirewallFirewall

• SSL VPN TunnelSSL VPN Tunnel

• Public Key Infrastructure (PKI) ServicesPublic Key Infrastructure (PKI) Services

• Biometric Secure IdentificationBiometric Secure Identification

• Consulting ServicesConsulting Services

Page 11: Castle Presentation 08-12-04

VST SOLUTIONSVST SOLUTIONS

Virtual Security Appliance - FirewallVirtual Security Appliance - Firewall

Page 12: Castle Presentation 08-12-04

VST SOLUTIONSVST SOLUTIONS

Virtual Security Appliance - FirewallVirtual Security Appliance - Firewall

• Built on a lightweight version of SELinuxBuilt on a lightweight version of SELinux• Turn any server into a hardened platform .Turn any server into a hardened platform .• Application server becomes undetectable on the network.Application server becomes undetectable on the network.

Page 13: Castle Presentation 08-12-04

VST SOLUTIONSVST SOLUTIONS

Virtual Security Appliance – SSL VPNVirtual Security Appliance – SSL VPN

Page 14: Castle Presentation 08-12-04

VST SOLUTIONSVST SOLUTIONS

Virtual Security Appliance – SSL VPNVirtual Security Appliance – SSL VPN

• Works with and in Conjunction with Linux FirewallWorks with and in Conjunction with Linux Firewall• Provides non clear text access to the ApplicationProvides non clear text access to the Application• Encryption greater then 2048bitEncryption greater then 2048bit• Can exist in a P5 PartitionCan exist in a P5 Partition

Page 15: Castle Presentation 08-12-04

PKIPKI

Public/Private Key InfrastructurePublic/Private Key Infrastructure

Page 16: Castle Presentation 08-12-04

idTRUST – PKI INFRASTRUCTUREidTRUST – PKI INFRASTRUCTURE

WHY IS A PKI INFRASTRUCTURE NECESSARY?WHY IS A PKI INFRASTRUCTURE NECESSARY?• Optional key generationOptional key generation

• Validate initial identitiesValidate initial identities

• Issuance, renewal and termination of certificatesIssuance, renewal and termination of certificates

• Certificate validationCertificate validation

• Distribution of certificatesDistribution of certificates

• Secure archival and key recoverySecure archival and key recovery

• Generation of signatures and timestampsGeneration of signatures and timestamps

• Establish and manage trust relationshipsEstablish and manage trust relationships

Page 17: Castle Presentation 08-12-04

WHAT HAS BLOCKED PKI FROM GLOBAL USE?WHAT HAS BLOCKED PKI FROM GLOBAL USE?

• CostCost

• PKI Integration with vertical application basePKI Integration with vertical application base

• CA portability and interoperabilityCA portability and interoperability

idTRUST – PKI INFRASTRUCTUREidTRUST – PKI INFRASTRUCTURE

Page 18: Castle Presentation 08-12-04

PUBLIC/PRIVATE KEY GENERATIONPUBLIC/PRIVATE KEY GENERATION

LOCAL APPLICATIONLOCAL APPLICATION

• ERP, CRM, SCM….ERP, CRM, SCM….

BROWSERBROWSER

• WebSphere PortalWebSphere Portal

• Linux (PHP)Linux (PHP)

REMOTE SERVER COMMUNICATIONSREMOTE SERVER COMMUNICATIONS

Generate aPublic/Private

Key Pair

Page 19: Castle Presentation 08-12-04

WHY USE CRYPTOGRAPHY?WHY USE CRYPTOGRAPHY?

Cryptography can be applied to the following information categories:Cryptography can be applied to the following information categories:

• Information at restInformation at rest

• Information in transitInformation in transit

Cryptography is used to enable information:Cryptography is used to enable information:

• Privacy – information cannot be readPrivacy – information cannot be read

• Integrity – information cannot be modifiedIntegrity – information cannot be modified

• Authentication – information proof of ownershipAuthentication – information proof of ownership

• Non-repudiation – cannot deny involvement in transactionNon-repudiation – cannot deny involvement in transaction

Page 20: Castle Presentation 08-12-04

ASYMETTRIC KEY CRYPTOGRAPHYASYMETTRIC KEY CRYPTOGRAPHY

Different keys (secrets) are used for both the encryption and decryption processes:

Public KeyCipher Ciphertext

information

CleartextPublic Key

CipherJ9%B8^cBt

Ciphertext

Asymmetric key“public key”

Asymmetric key“private key”

Decryption ProcessEncryption Process

Asymmetric key cryptography is characterized by the use of two independent but mathematically related keys

J9%B8^cBt

Page 21: Castle Presentation 08-12-04

DIGITAL RIGHTSDIGITAL RIGHTS

WHAT IS DIGITAL RIGHTS?WHAT IS DIGITAL RIGHTS?

Gives us the ability to . . . Gives us the ability to . . .

• Assign ownership to documents or dataAssign ownership to documents or data

• Ensure that data has not been altered during transferEnsure that data has not been altered during transfer

• Provide authenticationProvide authentication

Page 22: Castle Presentation 08-12-04

CURRENT METHODCURRENT METHOD

• Username and passwordUsername and password

• Card and PINCard and PIN

• RSA TokenRSA Token

• BiometricsBiometrics

USER IDENTIFICATIONUSER IDENTIFICATION

Page 23: Castle Presentation 08-12-04

TOMORROW’S SECURITY TODAYTOMORROW’S SECURITY TODAY

• Secure user authenticationSecure user authentication

• PKIPKI

• Virtualized SecurityVirtualized Security

• SSL VPN TunnelsSSL VPN Tunnels

NEXT GENERATION SECURITYNEXT GENERATION SECURITY

Page 24: Castle Presentation 08-12-04

USER IDENTIFICATIONUSER IDENTIFICATION

• Crypto-processor cardCrypto-processor card

• Biometrics on cardBiometrics on card

• ACLU friendlyACLU friendly

DATAQUEST TECHNOLOGIES’ SOLUTIONSDATAQUEST TECHNOLOGIES’ SOLUTIONS

Page 25: Castle Presentation 08-12-04

SECURE IDENTITY TRUST CARDSECURE IDENTITY TRUST CARD

BIOMETRIC CARD FEATURES & CHARACTERISTICSBIOMETRIC CARD FEATURES & CHARACTERISTICS

• Similar to credit card-sized “Smart Card,” but also contains on-card crypto processorSimilar to credit card-sized “Smart Card,” but also contains on-card crypto processor

• Maintains protected storage for public/private keys, digital certificates and digital Maintains protected storage for public/private keys, digital certificates and digital

signatures to be used during authentication processsignatures to be used during authentication process

• Executes cryptographic operations (verifies fingerprint) Executes cryptographic operations (verifies fingerprint)

• Works in conjunction with card operating system (COS)Works in conjunction with card operating system (COS)

Page 26: Castle Presentation 08-12-04

BIOMETRIC SECURE IDENTITY CARDBIOMETRIC SECURE IDENTITY CARD

HOW THE IDENTITY TRUST CARD WORKSHOW THE IDENTITY TRUST CARD WORKS

• User enrolls in the Biometric process Card maintains encrypted hash copy of User enrolls in the Biometric process Card maintains encrypted hash copy of

user’s fingerprint in EEPROMuser’s fingerprint in EEPROM

• When user wishes to authenticate him/herself, he/she simply places the correct When user wishes to authenticate him/herself, he/she simply places the correct

finger on the e-field sensorfinger on the e-field sensor

• The fingerprint is scanned, hashed and encryptedThe fingerprint is scanned, hashed and encrypted

• The crypto processor compares the fingerprint sample to the stored valueThe crypto processor compares the fingerprint sample to the stored value

• Card typically returns success or failure status to systemCard typically returns success or failure status to system

Page 27: Castle Presentation 08-12-04

CRYPTO-PROCESSING CHIP LAYOUTCRYPTO-PROCESSING CHIP LAYOUT

VCC

Reset

Clock

GND

I/O

32-bit

Microprocessor

(Microcontroller)

RAM 2K Bytes

ROM 32K+ Bytes

EEPROM 64K+ Bytes

Crypto

Accelerator

(Processor)

ISO 7816 Family of

Smart/Crypto Card

Standards, i.e., power,

Clock & I/O Bus

Page 28: Castle Presentation 08-12-04

BIOMETRIC SECURE IDENTITY TRUST CARDBIOMETRIC SECURE IDENTITY TRUST CARD

CARD CUSTOMIZATION CAPABILITIESCARD CUSTOMIZATION CAPABILITIES

• Multiple processors (4,6,8, etc.)Multiple processors (4,6,8, etc.)

• Mix and match 8, 16 and 32 bit processors for focused tasksMix and match 8, 16 and 32 bit processors for focused tasks

• Memory (inter-processor and processor specific)Memory (inter-processor and processor specific)

• Multiple custom data structure (application and processor)Multiple custom data structure (application and processor)

• Potentially contact-based and contact-less cardsPotentially contact-based and contact-less cards

Page 29: Castle Presentation 08-12-04

BIOMETRIC READERSBIOMETRIC READERS

● Optical Sensor

● Capacitive Sensor

● E-Field Sensor

Page 30: Castle Presentation 08-12-04

USER IDENTIFICATION SUMMARYUSER IDENTIFICATION SUMMARY

• Crypto-processor cardCrypto-processor card

• Biometrics on cardBiometrics on card

• PKI data on cardPKI data on card

DATAQUEST TECHNOLOGIES’ SOLUTIONSDATAQUEST TECHNOLOGIES’ SOLUTIONS

Page 31: Castle Presentation 08-12-04

VST SOLUTIONSVST SOLUTIONS

Certificate Authority SoftwareCertificate Authority Software

Page 32: Castle Presentation 08-12-04

INDUSTRY-SPECIFIC APPLICATIONSINDUSTRY-SPECIFIC APPLICATIONS

MasterTrustCenters

Organizations

Departments,Groups,RegionalCenters

DataQuestMaster Trust

Center (Security Level 1, 2, 3)

Smallbusiness

Level 1, 2Finance

Level 1Level 1, 3

Level 1, 2, 3

Level 1 Level 1, 2

Healthcare

Medical recordsdatabase

Level 3

Level 1, 2, 3

Level 1

Third Party Master Trust

Center Certificateinteroperability

(depends on level of trust)

Trust CenterTrust Center

Trust Center

Smallbusiness

Smallbusiness

Geographic(Regional)

Trust Center

Trust Center Trust Center

Trust Center Trust Center

Trust Center

Page 33: Castle Presentation 08-12-04

VST SOLUTIONSVST SOLUTIONS

Works in P5 SystemWorks in P5 System

P5

Firewall SSL VPN

Certificate Authority

Applications

Page 34: Castle Presentation 08-12-04

PROFESSIONAL SERVICESPROFESSIONAL SERVICES

• Biometric smart card, trust center and PKI integrationBiometric smart card, trust center and PKI integration

• Secure application design, development and implementationSecure application design, development and implementation

• Enterprise security servicesEnterprise security services

• Custom software and consulting servicesCustom software and consulting services

• Project managementProject management

• Training and educationTraining and education

Page 35: Castle Presentation 08-12-04

• Security Inventory Security Inventory

• Security Policies and Procedures Guide DevelopmentSecurity Policies and Procedures Guide Development

• IT Governance Audit/AssessmentIT Governance Audit/Assessment

• Penetration TestingPenetration Testing

• Disaster Recovery Planning and ImplementationDisaster Recovery Planning and Implementation

SECURITY SERVICESSECURITY SERVICES

Page 36: Castle Presentation 08-12-04

DATAQUEST TECHNOLOGIES’ SOLUTIONSDATAQUEST TECHNOLOGIES’ SOLUTIONS

Questions?Questions?