Top Banner
The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation www.v-one.com
18

The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

The Challenges of Secure Knowledge Management

September 23, 2004Margaret E. Grayson, President & CEOV-ONE Corporationwww.v-one.com

Page 2: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Trust

Mobility

Privacy

Governance

Challenges

The Human Factor is Critical

Page 3: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Developing a Secure “Trust” Model

Page 4: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Basic Security Requirements

• Identity• Access Control• Mutual

Authentication• Data Encryption• Non-repudiation

Page 5: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Establishing Cyber-Trust

InternalHosts / Systems

DHS

SmartGate VPN Server

Authorized Users

Secure Connection

100% control

End-to-End Security:

• Encryption - AES or Triple DES, NIST FIPS Certified • Strong Authentication - Two Factor, Mutual, NIST FIPS Certified • Access Control - Fully Integrated, Central or Distributed Management • Audit Logging - Logs all user activity

Firewall

Trusted Environment

Single PortProxy (443)

- Windows 2000, 2003, NT- Sun Solaris- Linux RedHat

On User Side:SmartPass

Page 6: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Knowledge Management for a Mobile Workforce

Page 7: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Remote Field Personnel

Forward to destination

Application (Trusted Environment)

• Unpackage• Decrypt (payload)• Validate

Receive packet

Transmit packet

VPN Client• Encrypt• Package

Addressing informationfor VPN server

Addressing information for destination (obtained from decrypted payload)

Payload TCP header IP header

Payload TCP header IP header

Data Communication Info

Data Communication Info

VPN ServerSmart VPN client

Scientific Data Collection For Tom Brown Inc.

Secure End-to-End ConnectivitySecure End-to-End Connectivity

Page 8: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

ORI’s Motor Carrier HAZMAT System

Communication Center Server

Alert message with vehicle ID, location, and crash information

Gypsum Express Truck with Qualcomm System and ACN Device

2. View Crash and HAZMAT Details on Secure Web

Pages

Fleet Manager Database

Waybill File

Town Dispatch Center

1. Alert Notification via

Pager

National Message Center

So that first responders are NOT the “first victims”So that first responders are NOT the “first victims”

Page 9: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Real-Time Information Flow for Bomb Squads

Accredited Bomb Squad Personnel

VPN Server

CoBRA(Chemical Biological

Response Aid)

Smart VPN client

Wireless LAN

Public or Private,

IP Networks(LANs, WANs, Internet, etc.)

FBI LEO (Law Enforcement

Online)

Access to Critical Information:• Effects• Protective Gear• Response Measures• Defusing an Explosive• Closest Safe Detonation Site• Decontamination Procedures

Page 10: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Privacy Challenges

Page 11: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Protecting Privacy is Fundamental

• Information privacy is a basic right• Government privacy regulations must be

observed• Security technology can help to enable privacy

protections that allow only authorized users to access specific data– Extend protected information access – Maintain system control by unique data owners– Provide ability to securely add new users on demand– Control risk of inappropriate access

Security technology is necessary to maximize information value

Security technology is necessary to maximize information value

Page 12: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Law Enforcement… Secure Information Sharing

LEOLEO RISSNET

“Name”

NCIC

Agency Indices & Files

Task Force Contacts

RISSLeads

RISSIntel

RISSGangs

Encrypted SBUEncrypted SBU

SBUSBU Environment forEnvironment forEnhanced Sharing & CollaborationEnhanced Sharing & Collaboration

Secured by V-ONE SmartGate®

Secured by V-ONE SmartGate®

Source: Derived from SBU Briefing File, Department of Justice, M. Miles Matthews

Page 13: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

HIPAA… Information Access Control

SmartGate Encryption Server

Mcp.hospital.com

Agencies.mtf.hospital.com

Group A -Healthcare Provider(s)

Group B - Physicians/Portals

Group C - Outsourced Service Provider(s)

Centralized Authentication

Pharmacy

Patient Records

Billing

Database

Email

Extranet Web

Corporate

Ensure data is put in the hands of those who should appropriately act on the information

Page 14: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Governance Issues

Page 15: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Governance Responsibilities

Your policy and technology choices must work together in practice!Your policy and technology choices must work together in practice!

• Security policy for knowledge management‒ Focus on process‒ Serve the business goals

• Security “ROI” metrics ‒ FUD (Fear, Uncertainty, Doubt)‒ Risk management and business continuity ‒ Productivity - supply chain, mobility, cost

savings • Oversight responsibilities elevated to the

boardroom‒ Sarbanes-Oxley‒ Cyberspace citizens

Page 16: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Secure Knowledge Management Best Practices

Page 17: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

Best Practices

Four important questions to ask when implementing secure knowledge management…

1. How secure is secure enough?Establishing cyber-trust is criticalSensitive information requires strong security

2. Is security available “on-demand”? Choose self-provisioning solutions that support wide variety of user and operational environments, including mobile ones

3. Will the security features be used? End-user transparency

Centralized policy management

4. Can I leverage my IT investment?Gain advantages from agnostic solutionsImplement technology to support your business objectives

Page 18: The Challenges of Secure Knowledge Management September 23, 2004 Margaret E. Grayson, President & CEO V-ONE Corporation .

 

www.v-one.com  

V-ONE Corporation20300 Century Blvd. Suite 200

Germantown, MD 208741-800-495-VONE

V-ONE, SmartGate, SmartGuard, SmartWall, SmartPass, and Security for a Connected World are registered trademarks or trademarks of V-ONE Corporation. Other company or product names mentioned in this documents are registered trademarks or trademarks of their

respective companies.

Thank You

“Security for a Connected World”