The Challenges of Secure Knowledge Management - PowerPoint PPT Presentation

About This Presentation
Title:

The Challenges of Secure Knowledge Management

Description:

Access Control - Fully Integrated, Central or Distributed Management ... CoBRA (Chemical Biological. Response Aid) Smart VPN client. Wireless LAN. Public or Private, ... – PowerPoint PPT presentation

Number of Views:25
Avg rating:3.0/5.0
Slides: 19
Provided by: cseBu
Learn more at: https://cse.buffalo.edu
Category:

less

Transcript and Presenter's Notes

Title: The Challenges of Secure Knowledge Management


1
The Challenges of Secure Knowledge Management
September 23, 2004 Margaret E. Grayson,
President CEO V-ONE Corporation www.v-one.com
2
Challenges
  • Trust
  • Mobility
  • Privacy
  • Governance

The Human Factor is Critical
3
Developing a Secure Trust Model
4
Basic Security Requirements
  • Identity
  • Access Control
  • Mutual Authentication
  • Data Encryption
  • Non-repudiation

5
Establishing Cyber-Trust
Trusted Environment
DHS
Authorized Users
Secure Connection 100 control
SmartGate VPN Server
Single Port Proxy (443)
On User Side SmartPass
Firewall
- Windows 2000, 2003, NT - Sun Solaris - Linux
RedHat
Internal Hosts / Systems
  • End-to-End Security
  • Encryption - AES or Triple DES, NIST FIPS
    Certified
  • Strong Authentication - Two Factor, Mutual,
    NIST FIPS Certified
  • Access Control - Fully Integrated, Central or
    Distributed Management
  • Audit Logging - Logs all user activity

6
Knowledge Management for a Mobile Workforce
7
Scientific Data Collection For Tom Brown Inc.
Remote Field Personnel
VPN Server
Smart VPN client
(Trusted Environment)
Application
Receive packet
Data Communication Info
Payload TCP header IP header
  • VPN Client
  • Encrypt
  • Package
  • Unpackage
  • Decrypt (payload)
  • Validate

Data Communication Info
Transmit packet
Addressing information for destination (obtained
from decrypted payload)
Payload TCP header IP header
Addressing information for VPN server
Forward to destination
Secure End-to-End Connectivity
8
ORIs Motor Carrier HAZMAT System
Fleet Manager Database
Waybill File
Communication Center Server
National Message Center
Alert message with vehicle ID, location, and
crash information
2. View Crash and HAZMAT Details on Secure Web
Pages
1. Alert Notification via Pager
Gypsum Express Truck with Qualcomm System and ACN
Device
Town Dispatch Center
So that first responders are NOT the first
victims
9
Real-Time Information Flow for Bomb Squads
Accredited Bomb Squad Personnel
FBI LEO (Law Enforcement Online)
Public or Private, IP Networks (LANs, WANs,
Internet, etc.)
Wireless LAN
  • Access to Critical Information
  • Effects
  • Protective Gear
  • Response Measures
  • Defusing an Explosive
  • Closest Safe Detonation Site
  • Decontamination Procedures

CoBRA
(Chemical Biological Response Aid)
10
Privacy Challenges
11
Protecting Privacy is Fundamental
  • Information privacy is a basic right
  • Government privacy regulations must be observed
  • Security technology can help to enable privacy
    protections that allow only authorized users to
    access specific data
  • Extend protected information access
  • Maintain system control by unique data owners
  • Provide ability to securely add new users on
    demand
  • Control risk of inappropriate access

Security technology is necessary to maximize
information value
12
Law Enforcement Secure Information Sharing
Secured by V-ONE SmartGate
Secured by V-ONE SmartGate
Source Derived from SBU Briefing File,
Department of Justice, M. Miles Matthews
13
HIPAA Information Access Control
Corporate
Group A - Healthcare Provider(s)
Pharmacy
Database
SmartGate Encryption Server
Patient Records
Group B - Physicians/Portals
Email
Billing
Group C - Outsourced Service Provider(s)
Extranet Web
Centralized Authentication
Mcp.hospital.com
Agencies.mtf.hospital.com
Ensure data is put in the hands of those who
should appropriately act on the information
14
Governance Issues
15
Governance Responsibilities
  • Security policy for knowledge management
  • Focus on process
  • Serve the business goals
  • Security ROI metrics
  • FUD (Fear, Uncertainty, Doubt)
  • Risk management and business continuity
  • Productivity - supply chain, mobility, cost
    savings
  • Oversight responsibilities elevated to the
    boardroom
  • Sarbanes-Oxley
  • Cyberspace citizens

Your policy and technology choices must work
together in practice!
16
Secure Knowledge Management Best Practices
17
Best Practices
  • Four important questions to ask when implementing
    secure knowledge management
  • 1. How secure is secure enough?
  • Establishing cyber-trust is critical
  • Sensitive information requires strong security

2. Is security available on-demand?
Choose self-provisioning solutions that support
wide variety of user and operational
environments, including mobile ones
3. Will the security features be used?
End-user transparency Centralized policy
management
4. Can I leverage my IT investment? Gain
advantages from agnostic solutions Implement
technology to support your business objectives
18
Thank You
  www.v-one.com     V-ONE Corporation 20300
Century Blvd. Suite 200 Germantown, MD
20874 1-800-495-VONE V-ONE, SmartGate,
SmartGuard, SmartWall, SmartPass, and Security
for a Connected World are registered trademarks
or trademarks of V-ONE Corporation. Other
company or product names mentioned in this
documents are registered trademarks or trademarks
of their respective companies.
Security for a Connected World
Write a Comment
User Comments (0)
About PowerShow.com