Protocol Usage in Secure Networks - PowerPoint PPT Presentation

About This Presentation
Title:

Protocol Usage in Secure Networks

Description:

World Oyster Views. Secure Protocols - Definitions. Secure Protocols - Defined. Example ... World Oyster View. Integrated Security Network. Internal Protocol ... – PowerPoint PPT presentation

Number of Views:17
Avg rating:3.0/5.0
Slides: 16
Provided by: stephe521
Category:

less

Transcript and Presenter's Notes

Title: Protocol Usage in Secure Networks


1
Protocol Usage in Secure Networks
Matthew G. Marsh Chief Scientist,
NEbraskaCERT President, Paktronix Systems LLC
Note Use of this material is restricted to
acceptable use as defined in the document titled
"Acceptable Use of NEbraskaCERT Educational
Materials"
2
Overview
  • Principle of Inviolability
  • PoI - Definitions
  • Risk Boundary Analysis
  • Integrated Security Network
  • ISO/OSI 7-Layer Model
  • Physical/Logical Network Structures
  • Protocols vs. Transports
  • CIA
  • World Oyster Views
  • Secure Protocols - Definitions
  • Secure Protocols - Defined
  • Example

3
Principle of Inviolability
An object is considered Inviolate when all
communication with that object is provably
limited to the scope of service provided by that
object.
4
PoI - Definitions
  • Object
  • The entire set of devices/networks/etc that can
    be encapsulated by a defined boundry.
  • Communication
  • Any Input/Output through the boundary
  • Provably Limited
  • Both theory AND practice confirm the
    Communication and Boundary scopes.
  • Scope of Service
  • What the object provides through the boundary

5
Risk Boundary Analysis
  • Define Boundary
  • PoI vs. Connectivity
  • Finite vs. Infinite
  • Discrete Structure
  • Quanta and Tao

6
Integrated Security Network
  • Fulfills PoI as an Object
  • Internally PoI consistent
  • Each internal object fulfills PoI

7
ISO/OSI
  • All People Seem To Need Diet Pepsi
  • Tastes Great! - Less Filling!

8
PhysiLog Networks
  • What is a Network?
  • Protocol, Communication, Scope
  • What is the structure?
  • Bus Tag Pipe Ring...
  • What is your favorite colour?
  • Oh - wrong scene - try again
  • What is the PhysioLog Structure?

9
Protocols vs. Transports
  • What is a Protocol?
  • And how far down do you go in the stack?
  • What is a Transport?
  • Tunnels, Encapsulations, Raw
  • Remember the PhysioLog definitions

10
CIA
  • Confidentiality
  • Verify who saw the data
  • Integrity
  • Verify the data is not modified
  • Authenticity
  • Verify the data owner
  • Cranial Inspection Authority

11
World Oyster View
  • Integrated Security Network
  • Internal Protocol Structures
  • Why Use other protocols

12
Secure Protocols
  • Network Transport
  • Routable
  • Capable of extending across physical and logical
    boundaries
  • Encapsulable
  • Routable through inclusion within a routable
    transport
  • Fine Grained
  • Capable of filter application within endpoint
    structure
  • Non Network Transport
  • Encapsulable
  • Fine Grained

13
Secure Protocols - Cont'd
  • IP/IPX
  • Routable, Encapsulable, Fine Grained
  • NetBIOS/UEI
  • Encapsulable, Fine Grained
  • Serial/Parallel
  • Non Network, Encapsulable

14
Example
15
Protocol Usage
Matthew G. Marsh Chief Scientist,
NEbraskaCERT President, Paktronix Systems
LLC chief.scientist_at_nebraskacert.org
Write a Comment
User Comments (0)
About PowerShow.com