Title: Protocol Usage in Secure Networks
1Protocol Usage in Secure Networks
Matthew G. Marsh Chief Scientist,
NEbraskaCERT President, Paktronix Systems LLC
Note Use of this material is restricted to
acceptable use as defined in the document titled
"Acceptable Use of NEbraskaCERT Educational
Materials"
2Overview
- Principle of Inviolability
- PoI - Definitions
- Risk Boundary Analysis
- Integrated Security Network
- ISO/OSI 7-Layer Model
- Physical/Logical Network Structures
- Protocols vs. Transports
- CIA
- World Oyster Views
- Secure Protocols - Definitions
- Secure Protocols - Defined
- Example
3Principle of Inviolability
An object is considered Inviolate when all
communication with that object is provably
limited to the scope of service provided by that
object.
4PoI - Definitions
- Object
- The entire set of devices/networks/etc that can
be encapsulated by a defined boundry. - Communication
- Any Input/Output through the boundary
- Provably Limited
- Both theory AND practice confirm the
Communication and Boundary scopes. - Scope of Service
- What the object provides through the boundary
5Risk Boundary Analysis
- Define Boundary
- PoI vs. Connectivity
- Finite vs. Infinite
- Discrete Structure
- Quanta and Tao
6Integrated Security Network
- Fulfills PoI as an Object
- Internally PoI consistent
- Each internal object fulfills PoI
7ISO/OSI
- All People Seem To Need Diet Pepsi
- Tastes Great! - Less Filling!
8PhysiLog Networks
- What is a Network?
- Protocol, Communication, Scope
- What is the structure?
- Bus Tag Pipe Ring...
- What is your favorite colour?
- Oh - wrong scene - try again
- What is the PhysioLog Structure?
9Protocols vs. Transports
- What is a Protocol?
- And how far down do you go in the stack?
- What is a Transport?
- Tunnels, Encapsulations, Raw
- Remember the PhysioLog definitions
10CIA
- Confidentiality
- Verify who saw the data
- Integrity
- Verify the data is not modified
- Authenticity
- Verify the data owner
- Cranial Inspection Authority
11World Oyster View
- Integrated Security Network
- Internal Protocol Structures
- Why Use other protocols
12Secure Protocols
- Network Transport
- Routable
- Capable of extending across physical and logical
boundaries - Encapsulable
- Routable through inclusion within a routable
transport - Fine Grained
- Capable of filter application within endpoint
structure - Non Network Transport
- Encapsulable
- Fine Grained
13Secure Protocols - Cont'd
- IP/IPX
- Routable, Encapsulable, Fine Grained
- NetBIOS/UEI
- Encapsulable, Fine Grained
- Serial/Parallel
- Non Network, Encapsulable
14Example
15Protocol Usage
Matthew G. Marsh Chief Scientist,
NEbraskaCERT President, Paktronix Systems
LLC chief.scientist_at_nebraskacert.org