George L. Heron
This presentation is the property of its rightful owner.
Sponsored Links
1 / 22

George L. Heron Technology Officer, SafeNet, Inc. PowerPoint PPT Presentation


  • 79 Views
  • Uploaded on
  • Presentation posted in: General

George L. Heron Technology Officer, SafeNet, Inc. Abstract. This presentation will cover: Proper and workable approaches for dealing with wireless security Techniques for securing a wireless device Available and effective security technologies

Download Presentation

George L. Heron Technology Officer, SafeNet, Inc.

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


George l heron technology officer safenet inc

George L. Heron Technology Officer, SafeNet, Inc.


Abstract

Abstract

  • This presentation will cover:

    • Proper and workable approaches for dealing with wireless security

    • Techniques for securing a wireless device

    • Available and effective security technologies

    • The #1 vulnerability with wireless devices (and #2, #3, . . .)


Holy smokes where s my pda

“Holy Smokes … where’s my PDA?!”

  • It has happened to everyone.

  • If your PDA is lost or stolen:

    • personal information is exposed

    • your latest data entries are lost

    • and if tied into your corporate enterprise . . .your entire network security is compromised!


The need for wireless security

The Need for Wireless Security


Security risks

Security Risks

  • Physical

    • Loss or theft  hacker accesses data files, keys

  • Visual

    • Nosy neighbors on planes, trains & automobiles

  • Electronic

    • Packet sniffers on Internet

    • Weak or no encryption

    • Weak or no authentication (simple passwords)

    • 802.11 sniffer out in corporate office parking lot


What s an it manager to do

What’s an IT Manager to Do?

  • Recognize the problems

  • Get regular notifications of threats

  • Study the technologies, alternatives, vendors

  • Stay current with OS service packs & app updates

  • Allocate appropriate budget

  • Purchase appropriate software & licenses

  • Limit corporate PDA purchases to specific list

  • Develop procedures & policies for remote usage

  • Train the corporate population

  • Develop written policies for remote access

  • Consider a managed service


Specifics please

Specifics, Please!

  • Enforce use of solid passwords

  • Utilize built-in security mechanisms

  • Provide immutable forced policies

  • Use standard & well-maintained antivirus programs

  • Use file encryption for internal data, folders, etc.

  • Provide “device access control” – smart card, token

  • Enforce use of encrypted connections, VPN tunnels!

  • Provide and maintain a good firewall


Electronic security mechanisms

Electronic Security Mechanisms

  • Protocol

    • IPSec is the best, WEP, SSL

  • Keys

    • 768-bit, 1024-bit most common

    • RSA signatures most common, ECC

    • Preshared secrets today, public keys tomorrow

  • Encrypting Algorithms

    • TDES most common, AES coming

  • Authentication

    • 2-Factor (RSA SecurID), Certificates, PINs

    • Biometrics


Getting security policy to all corporate users

Getting Security Policy to All Corporate Users


Wireless phones pdas laptops are all network devices

Wireless Phones, PDAs, Laptops are All Network Devices


Top 10 remote security risks

Top 10 Remote Security Risks

  • Risk 1:PDA “local data” storage is exposed (contacts and messages)

  • Risk 2:Clear transmission of application data

  • Risk 3:PDA user data access via desk stand

  • Risk 4:PDA “applications” access via desk stand (Trojan Horse)

  • Risk 5:PDA Device to PDA Device communications are not encrypted (RIM)

Hacker

Technical Expert

Intelligence Agency


Top 10 remote security risks1

Top 10 Remote Security Risks

  • Risk 6: E-mail

  • Risk 7:No Authentication for device or network access

  • Risk 8:Device Encryption Keys

  • Risk 9:User applications are not secured (insertion of Trojan Horse)

  • Risk 10:Human factors

Hacker

Technical Expert

Intelligence Agency


Three points of wireless vulnerability

Three Points of Wireless Vulnerability

SecureALL communicationsbetween the remote user and the corporate LAN


Examples of wireless security products

Examples of Wireless Security Products

  • What can IT managers do to strengthen the corporate (remote) network?

  • Software

    • Security in Software

  • Hardware

    • Security in Silicon

  • Accessories

    • Security in Add-on Devices


Vpn client

VPN Client

  • Use in PDAs, phones and laptops

    • Use a VPN software client that offers secure client-to-gateway communication over wireless networks

    • Use a product that is interoperable, with many different gateways


Vpn simple cost effective

VPN: Simple, Cost-Effective

  • Use the Internet to establish secure links via

    • Authentication

    • Encryption

    • Secure tunneling

  • to access business partners, branch offices, and telecommuters


Hardware security

Hardware Security


Security embedded in silicon

Security Embedded in Silicon

  • Embedded security includes all relevant cryptographic functionality in hardware form as well as a full-featured software library that runs on the processors on chip.

  • Full functionality includes:

    • Encryption Engines: DES/3DES, ARC4, AES

    • Hash Engines: SHA-1, MD5, RIPEMD-128/160

    • IPSec Packet Engine

    • Public Key Accelerator

    • RSA, DSA Digital Signatures

    • Entropy-based True Random Number Generator (RNG)

  • 2.5G and 3G device manufacturers, wireless service providers, and wireless application providers, in using embedded silicon, provide accessibility to all cryptographic functionality in any combination of hardware and software.


Smart card readers secure tokens

Smart Card Readers Secure Tokens

CARD ACCESS CONTROL

  • Device Access Control allows only YOU to power up the device and/or use the select applications


Protecting the platform

Protecting the Platform

DEVICE SECURITY

  • PIN & Biometric access control

  • File-based encryption

  • Unchangeable VPN policies

  • Application-level controls

  • Time-of-day access granularity


Summary

Summary

  • Assess your risk

  • Protect the data on the remote phone, PDA, laptop

  • Protect the network with a VPN

  • Establish and enforce security policies and procedures

  • Stay current with all new security threats

  • If you take basic precautions and use the techniques outlined here you CAN be safe in a wireless world!


  • Presented by

    Presented by:

    George L. Heron

    Technology Officer

    SafeNet, Inc.

    8029Corporate Drive

    Baltimore, MD21236

    Website: www.safenet-inc.com

    Telephone: +1-410-933-5883

    Fax: +1-410-931-7524

    Email: [email protected]


  • Login